Commit report for v3.0.x branch

The git bot announce at freeradius.org
Tue Jun 25 02:00:02 CEST 2019


New activity for FreeRADIUS (the high performance and highly configurable RADIUS server)

======
gpgsig -----BEGIN PGP SIGNATURE-----
 
 iQEzBAABCAAdFiEE8n1lTTL4FC4LtEWpfQ55zXdiHs0FAl0QvHoACgkQfQ55zXdi
 Hs3wMAf+NFM3o9IMfRFb++QHp5B5TR//3xaQccY16ky8CkLoKyOXHdkyNTzD1Yia
 xaUWpB9T+8Uzu5aZ8zyY2KSBtSbw63npUeaPCy/9Gq6xHL3UNHOf4kEJYHPc6e/P
 l4lIthu0b6QpyzfA3tiOStB4DCMmQOKgyCQ3qZJ8gvB+zXX2ZfJ1g1+5ClIbMrZT
 XmxJoAtixLZ/NBFByhgqloD8C9eIjdxilpcH1Scp4Miv0otDEw68zqoELhfPh/ET
 hcqwEZZ5vCHKJokNWXRu0U+apuGSzyNVSY8umpHl+A/TYLKwqdz0NF807Ike3EoP
 TQdUydqn+6eVHXE0OQ8NCZcxifjwtg==
 =gaMd
 -----END PGP SIGNATURE-----

note recent changes

Alan T. DeKok at 2019-06-24T12:05:09Z
Files modified:
	* doc/ChangeLog

Commit diff:
https://github.com/FreeRADIUS/freeradius-server/commit/6a135c01db5ce394837db5c608cb613a70186abc
====== 
gpgsig -----BEGIN PGP SIGNATURE-----
 
 iQEzBAABCAAdFiEE8n1lTTL4FC4LtEWpfQ55zXdiHs0FAl0QulIACgkQfQ55zXdi
 Hs3digf/eY7+ZF0yKJ/E//bPeFeZnaz/RcdcFBfuFYt5pEk8tc/rejkEBVa2S9x+
 u4HPr++AQcZn3aMIyMAmvVBIZpfRhJdjot5sWUEAokDlD1sQLMpj8GcwEzEa2kkA
 N9/zuFILlB2mlG5OxGGF/94fMjEf86qTHU6skEUVuZz0lUe5ftQFVkqM5PRhcQnW
 xZp4VWYPH3EUYmVP2A+LWmfCMny9OAgafUpcbrwwjTPjHxLLfn/u2Kwdd9SV7Pnh
 w0ToSSSIgQsvt47Zmqk0WZxyi5lmrX5QKxSLma69u/U4/xRuj7UgCPBC1TRHIbM9
 yBhz0SwLV4jd2iZwROmXzjQJo2r1HA==
 =GUpW
 -----END PGP SIGNATURE-----

EAP-pwd: fix side-channel leak where 1 in 2018 handshakes fail

Previously the Hunting and Pecking algorithm of EAP-pwd aborted when
more than 10 iterations are needed. Every iteration has a 50% chance
of finding the password element. This means one in every 2048 handshakes
will fail, in which case an error frame is sent to the client. This
event leaks information that can be abused in an offline password
brute-force attack. More precisely, the adversary learns that all 10
iterations failed for the given random EAP-pwd token. Using the same
techniques as in the Dragonblood attack, this can be used to brute-force
the password.

This patch fixes the above issue by executing enough iterations such that
the password element is always found eventually.

Note that timing and cache leaks remain a risk against the current
implementation of EAP-pwd.

Mathy Vanhoef (via Alan T. DeKok)@2019-06-24T11:56:02Z
Files modified:
	* src/modules/rlm_eap/types/rlm_eap_pwd/eap_pwd.c

Commit diff:
https://github.com/FreeRADIUS/freeradius-server/commit/3ea2a5a026e73d81cd9a3e9bbd4300c433004bfa
====== 
-- 
This commit summary was generated @2019-06-25T00:00:02Z by lgfeed version 0.00 (https://github.com/arr2036/lgfeed).


More information about the Freeradius-Devel mailing list