Package: libapache2-mod-authn-yubikey
Version: 1.0-5

While inspecting the source of this package, I found that it seems to send 
a user's client ID and password to a remote web site via a http: link, which
means it would be sent unencrypted. The suspect function is
yubikey_client_request() in authn_yubikey/libykclient.c  The URL template is:

http://api.yubico.com/wsapi/verify?id=%d&otp=%s

where the id= is set to client_id and otp= is set to "password" in
authn_check_otp().

Note that I'm not familiar with the package, I don't use it, I barely
understand what it's trying to do, and I didn't verify these results at run
time.  However, the host in question (api.yubico.com) has a valid TLS
certificate so there seems to be no reason to apply this patch:

+++ sources/authn_yubikey/libykclient.c.orig    2008-08-30 09:03:24.000000000 
-0700
--- sources/authn_yubikey/libykclient.c 2026-05-19 17:12:44.010781689 -0700
@@ -201,7 +201,7 @@
                        const char *yubikey)
 {
   struct MemoryStruct chunk = { NULL, 0 };
-  const char *url_template = "http://api.yubico.com/wsapi/verify?id=%d&otp=%s";;
+  const char *url_template = 
"https://api.yubico.com/wsapi/verify?id=%d&otp=%s";;
   char *url;
   char *user_agent = NULL;
   char *status;

Whether the existing package has been exposing users' passwords in cleartext
since 2011 and the impact that may have had, I'll leave to the maintainer to
determine.

Dan

Reply via email to