On Tue, Oct 5, 2010 at 15:18, Magnus Hagander <mag...@hagander.net> wrote:
> On Tue, Oct 5, 2010 at 11:01, Magnus Hagander <mag...@hagander.net> wrote:
>> On Sun, Oct 3, 2010 at 18:30, Alan T DeKok <al...@freeradius.org> wrote:
>>> Tom Lane wrote:
>>>> Hm ... seems to me that is a network security problem, not our problem.
>>>> Who's to say one of the spoofed packets won't pass verification?
>>>
>>>  The packets are signed with a shared key.  Passing verification means
>>> either the attacker knows the key, or the attacker has broken MD5 in
>>> ways that are currently unknown.
>>>
>>>> If you want to change it, I won't stand in the way, but I have real
>>>> doubts about both the credibility of this threat and the usefulness
>>>> of the proposed fix.
>>>
>>>  The credibility of the threat is high.  Anyone can trivially send a
>>> packet which will cause authentication to fail.  This is a DoS attack.
>>
>> I don't agree about how high it is - unless I misunderstand the
>> wording. You still need to have unfiltered access to the network that
>> the database server is on (unlikely) and you need to guess/bruteforce
>> the port (using bruteforce not really hard, but likely to be detected
>> by an IDS pretty quickly)
>>
>> It is definitely an opportunity for a DoS attack though, so it should be 
>> fixed.
>>
>> I find your suggested patches kind of hard to read posted inline that
>> way - any chance you can repost as attachment or publish it as a git
>> repository I can fetch from?
>
> Actually, nevermind that one. Here's a patch I worked up from your
> description, and that turns out to be fairly similar to yours in what
> it does I think - except I'm not rearranging the code into a separate
> function. We already have a while-loop.
>
> See attached context diff, and I've also included a diff without
> whitespace changes since the majority of the diff is otherwise coming
> from indenting the code one tab...
>
> (so far untested, I seem to have deleted my test-instance of the
> radius server, but I figured I should post my attempt anyway)

ok, I've run the patch through my tests of both valid and invalid
packets, and it seems to work the correct way now. Thus, applied.

-- 
 Magnus Hagander
 Me: http://www.hagander.net/
 Work: http://www.redpill-linpro.com/

-- 
Sent via pgsql-bugs mailing list (pgsql-bugs@postgresql.org)
To make changes to your subscription:
http://www.postgresql.org/mailpref/pgsql-bugs

Reply via email to