Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 16 Feb 2014 10:39:27 +0100
From:      Florian Weimer <fw@deneb.enyo.de>
To:        Alan DeKok <aland@freeradius.org>
Cc:        Pierre Carrier <pierre.carrier@airbnb.com>, secalert <secalert@redhat.com>, pkgsrc-security <pkgsrc-security@netbsd.org>, security@ubuntu.com, security@freeradius.org, pupykin.s+arch@gmail.com, security@debian.org, bugbusters <bugbusters@freebsd.org>
Subject:   Re: freeradius denial of service in authentication flow
Message-ID:  <87y51bwg4w.fsf@mid.deneb.enyo.de>
In-Reply-To: <52FFD55C.5030408@freeradius.org> (Alan DeKok's message of "Sat,  15 Feb 2014 16:00:12 -0500")
References:  <CAM7LUF55w4g7=GqhfFyys0fhJNKQtX-Pp804YWRW57GxbO9WDw@mail.gmail.com> <52FC1916.4060501@freeradius.org> <87sirkm8uo.fsf@mid.deneb.enyo.de> <52FFD55C.5030408@freeradius.org>

next in thread | previous in thread | raw e-mail | index | archive | help
* Alan DeKok:

> Florian Weimer wrote:
>> * Alan DeKok:
>> 
>>>   That's an issue, but a rare one IMHO.  The user has to exist on the
>>> system.  So this isn't a remote DoS.
>> 
>> Could you elaborate on this assessment?  Is this because typical data
>> sources for SSHA passwords limit the length of the salt and thus the
>> length of the SSHA hash?
>
>   Partly.  The typical use-case for a remote DoS is for an
> unauthenticated user to take down the system.  Here, the user has to be
> known, *and* be able to create a long SSHA password.
>
>   To me, this puts the issue into the category of "known users can do
> bad things", which is very different from "unknown users can do bad things".

Okay, fair enough.

As this is already public via

<http://lists.freebsd.org/pipermail/freebsd-bugbusters/2014-February/000610.html>;

, I will request a CVE on oss-security.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?87y51bwg4w.fsf>