Commit report for v3.0.x branch
The git bot
announce at freeradius.org
Tue Jun 25 02:00:02 CEST 2019
New activity for FreeRADIUS (the high performance and highly configurable RADIUS server)
======
gpgsig -----BEGIN PGP SIGNATURE-----
iQEzBAABCAAdFiEE8n1lTTL4FC4LtEWpfQ55zXdiHs0FAl0QvHoACgkQfQ55zXdi
Hs3wMAf+NFM3o9IMfRFb++QHp5B5TR//3xaQccY16ky8CkLoKyOXHdkyNTzD1Yia
xaUWpB9T+8Uzu5aZ8zyY2KSBtSbw63npUeaPCy/9Gq6xHL3UNHOf4kEJYHPc6e/P
l4lIthu0b6QpyzfA3tiOStB4DCMmQOKgyCQ3qZJ8gvB+zXX2ZfJ1g1+5ClIbMrZT
XmxJoAtixLZ/NBFByhgqloD8C9eIjdxilpcH1Scp4Miv0otDEw68zqoELhfPh/ET
hcqwEZZ5vCHKJokNWXRu0U+apuGSzyNVSY8umpHl+A/TYLKwqdz0NF807Ike3EoP
TQdUydqn+6eVHXE0OQ8NCZcxifjwtg==
=gaMd
-----END PGP SIGNATURE-----
note recent changes
Alan T. DeKok at 2019-06-24T12:05:09Z
Files modified:
* doc/ChangeLog
Commit diff:
https://github.com/FreeRADIUS/freeradius-server/commit/6a135c01db5ce394837db5c608cb613a70186abc
======
gpgsig -----BEGIN PGP SIGNATURE-----
iQEzBAABCAAdFiEE8n1lTTL4FC4LtEWpfQ55zXdiHs0FAl0QulIACgkQfQ55zXdi
Hs3digf/eY7+ZF0yKJ/E//bPeFeZnaz/RcdcFBfuFYt5pEk8tc/rejkEBVa2S9x+
u4HPr++AQcZn3aMIyMAmvVBIZpfRhJdjot5sWUEAokDlD1sQLMpj8GcwEzEa2kkA
N9/zuFILlB2mlG5OxGGF/94fMjEf86qTHU6skEUVuZz0lUe5ftQFVkqM5PRhcQnW
xZp4VWYPH3EUYmVP2A+LWmfCMny9OAgafUpcbrwwjTPjHxLLfn/u2Kwdd9SV7Pnh
w0ToSSSIgQsvt47Zmqk0WZxyi5lmrX5QKxSLma69u/U4/xRuj7UgCPBC1TRHIbM9
yBhz0SwLV4jd2iZwROmXzjQJo2r1HA==
=GUpW
-----END PGP SIGNATURE-----
EAP-pwd: fix side-channel leak where 1 in 2018 handshakes fail
Previously the Hunting and Pecking algorithm of EAP-pwd aborted when
more than 10 iterations are needed. Every iteration has a 50% chance
of finding the password element. This means one in every 2048 handshakes
will fail, in which case an error frame is sent to the client. This
event leaks information that can be abused in an offline password
brute-force attack. More precisely, the adversary learns that all 10
iterations failed for the given random EAP-pwd token. Using the same
techniques as in the Dragonblood attack, this can be used to brute-force
the password.
This patch fixes the above issue by executing enough iterations such that
the password element is always found eventually.
Note that timing and cache leaks remain a risk against the current
implementation of EAP-pwd.
Mathy Vanhoef (via Alan T. DeKok)@2019-06-24T11:56:02Z
Files modified:
* src/modules/rlm_eap/types/rlm_eap_pwd/eap_pwd.c
Commit diff:
https://github.com/FreeRADIUS/freeradius-server/commit/3ea2a5a026e73d81cd9a3e9bbd4300c433004bfa
======
--
This commit summary was generated @2019-06-25T00:00:02Z by lgfeed version 0.00 (https://github.com/arr2036/lgfeed).
More information about the Freeradius-Devel
mailing list