Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 24 Oct 2014 15:11:56 +0200
From:      "Ronald Klop" <ronald-lists@klop.ws>
To:        freebsd-stable@freebsd.org, "Jim Pirzyk" <pirzyk@freebsd.org>
Subject:   Re: [FreeBSD-Announce] FreeBSD Errata Notice FreeBSD-EN-14:11.crypt
Message-ID:  <op.xn8j96kqkndu52@ronaldradial.radialsg.local>
In-Reply-To: <F0DAE32B-34CF-4191-9070-A517ACDC6E2A@freeBSD.org>
References:  <201410222107.s9ML7nLC010739@freefall.freebsd.org> <F0DAE32B-34CF-4191-9070-A517ACDC6E2A@freeBSD.org>

next in thread | previous in thread | raw e-mail | index | archive | help
See: https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=192277

Regards,
Ronald.

On Fri, 24 Oct 2014 13:14:20 +0200, Jim Pirzyk <pirzyk@freebsd.org> wrote:

> Hi,
>
> I was wondering if there is more information about this change?  FreeBSD  
> changed the default away from DES to MD5 back in the 1.1.5 -> 2.0  
> transition.  It seems to me a downgrade and rewarding bad programming to  
> be changing back to DES now.  Also the proper course of action is to  
> correct programs that make the wrong assumption about what crypt()  
> changes.
>
> Thanks
>
> - JimP
>
> On Oct 22, 2014, at 4:07 PM, FreeBSD Errata Notices  
> <errata-notices@freebsd.org> wrote:
>
>> Signed PGP part
>> =============================================================================
>> FreeBSD-EN-14:11.crypt                                          Errata  
>> Notice
>>                                                           The FreeBSD  
>> Project
>>
>> Topic:          crypt(3) default hashing algorithm
>>
>> Category:       core
>> Module:         libcrypt
>> Announced:      2014-10-22
>> Affects:        FreeBSD 9.3 and FreeBSD 10.0-STABLE after 2014-05-11 and
>>                 before 2014-10-16.
>> Corrected:      2014-10-13 15:56:47 UTC (stable/10, 10.1-PRERELEASE)
>>                 2014-10-16 21:39:04 UTC (releng/10.1, 10.1-RC3)
>>                 2014-10-16 21:39:04 UTC (releng/10.1, 10.1-RC2-p2)
>>                 2014-10-16 21:39:04 UTC (releng/10.1, 10.1-RC1-p2)
>>                 2014-10-16 21:39:04 UTC (releng/10.1, 10.1-BETA3-p2)
>>                 2014-10-21 21:09:54 UTC (stable/9, 9.3-STABLE)
>>                 2014-10-21 23:50:46 UTC (releng/9.3, 9.3-RELEASE-p4)
>>
>> For general information regarding FreeBSD Errata Notices and Security
>> Advisories, including descriptions of the fields above, security
>> branches, and the following sections, please visit
>> <URL:http://security.freebsd.org/>.
>>
>> I.   Background
>>
>> The crypt(3) function performs password hashing.  Different algorithms
>> of varying strength are available, with older, weaker algorithms being
>> retained for compatibility.
>>
>> The crypt(3) function was originally based on the DES encryption
>> algorithm and generated a 13-character hash from an eight-character
>> password (longer passwords were truncated) and a two-character salt.
>>
>> II.  Problem Description
>>
>> In recent FreeBSD releases, the default algorithm for crypt(3) was
>> changed to SHA-512, which generates a much longer hash than the
>> traditional DES-based algorithm.
>>
>> III. Impact
>>
>> Many applications assume that crypt(3) always returns a traditional DES
>> hash, and blindly copy it into a short buffer without bounds checks.  
>> This
>> may lead to a variety of undesirable results including, at worst,  
>> crashing
>> the application.
>>
>> IV.  Workaround
>>
>> No workaround is available.
>>
>> V.   Solution
>>
>> Perform one of the following:
>>
>> 1) Upgrade your system to a supported FreeBSD stable or release /  
>> security
>> branch (releng) dated after the correction date.
>>
>> 2) To update your present system via a source code patch:
>>
>> The following patches have been verified to apply to the applicable
>> FreeBSD release branches.
>>
>> a) Download the relevant patch from the location below, and verify the
>> detached PGP signature using your PGP utility.
>>
>> # fetch http://security.FreeBSD.org/patches/EN-14:11/crypt.patch
>> # fetch http://security.FreeBSD.org/patches/EN-14:11/crypt.patch.asc
>> # gpg --verify crypt.patch.asc
>>
>> b) Apply the patch.  Execute the following commands as root:
>>
>> # cd /usr/src
>> # patch < /path/to/patch
>>
>> c) Recompile the operating system using buildworld and installworld as
>> described in <URL:http://www.FreeBSD.org/handbook/makeworld.html>.
>>
>> Restart all deamons using the library, or reboot the system.
>>
>> 3) To update your system via a binary patch:
>>
>> Systems running a RELEASE version of FreeBSD on the i386 or amd64
>> platforms can be updated via the freebsd-update(8) utility:
>>
>> # freebsd-update fetch
>> # freebsd-update install
>>
>> VI.  Correction details
>>
>> The following list contains the revision numbers of each file that was
>> corrected in FreeBSD.
>>
>> Branch/path                                                       
>> Revision
>> -------------------------------------------------------------------------
>> stable/9/                                                          
>> r273425
>> releng/9.3/                                                        
>> r273438
>> stable/10/                                                         
>> r273043
>> releng/10.1/                                                       
>> r273187
>> -------------------------------------------------------------------------
>>
>> To see which files were modified by a particular revision, run the
>> following command, replacing NNNNNN with the revision number, on a
>> machine with Subversion installed:
>>
>> # svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base
>>
>> Or visit the following URL, replacing NNNNNN with the revision number:
>>
>> <URL:http://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>;
>>
>> VII. References
>>
>> The latest revision of this Errata Notice is available at
>> http://security.FreeBSD.org/advisories/FreeBSD-EN-14:11.crypt.asc
>>
>> _______________________________________________
>> freebsd-announce@freebsd.org mailing list
>> http://lists.freebsd.org/mailman/listinfo/freebsd-announce
>> To unsubscribe, send any mail to  
>> "freebsd-announce-unsubscribe@freebsd.org"
>
> --- @(#) $Id: dot.signature,v 1.15 2007/12/27 15:06:13 pirzyk Exp $
>     __o  jim@pirzyk.org  
> --------------------------------------------------
>  _'\<,_
> (*)/ (*) I'd rather be out biking.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?op.xn8j96kqkndu52>