Re: [Cosign-discuss] Multiple factor bug

2012-09-19 Thread Andrew Mortensen
Thanks for the patch. I looked back through the history of that code, and it's 
always behaved that way, showing the login screen if any factor execution fails.

I don't see any reason why it should continue to, though. A check after the 
factorlist loop ensures that the user authenticated somehow. I've committed the 
patch to the master branch.

andrew


On Sep 18, 2012, at 4:22 PM, Jason Noble  wrote:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
> 
> I believe I have found a bug in the way factors are processed in
> cosign.cgi. The manpage has the following documentation:
> 
> If authentication is successful, the external authenticator writes the
> factor name on stdout (file descriptor 1) and exits with a value of 0.
> If an error occurs, the external authenticator writes an error message
> on stdout and exits with a value of 1. If the user’s password has
> expired, the external authenticator writes an error message on stdout
> and exits with a value of 2. All other exit values are reserved for
> future use.
> 
> - From that documentation, I would assume that the following lines in
> cosign.conf would allow a login from factor1 *or* factor2 so long as
> one of them exited with code 0 and wrote the factor name on stdout.
> 
> factor /usr/local/lib/cosign/factor/factor1 login password
> factor /usr/local/lib/cosign/factor/factor2 login password
> 
> I find this to not be the case. I believe the goto loginscreen is
> being called prematurely, causing the for loop over the factors to be
> terminated as soon as a single factor fails. I have tested the
> attached patch and it provides the behavior I was expecting, where
> valid credentials supplied for factor1 *or* factor2 result in a
> successful login. I submit this patch for the review of the Cosign
> maintainers.
> 
> Cheers,
> Jason
> -BEGIN PGP SIGNATURE-
> Version: GnuPG/MacGPG2 v2.0.17 (Darwin)
> Comment: GPGTools - http://gpgtools.org
> Comment: Using GnuPG with Mozilla - http://www.enigmail.net/
> 
> iQEcBAEBAgAGBQJQWNfoAAoJEFBPX7xqwa0XFgQH/0DaFEynGzysVFzz8ly/ckjE
> Ni4LrbUIWNTdZ5RkYXqy4tXz0cPn4mdXv06ySx0ulkfsQ9FLbBKwbPGGTbQeRD5g
> 0gJgoz4XTqrbh7StEg1eUci8R24wUdQrHpRHj0uYGd/oY7mAOx/D9Si5dflZFyzy
> tgJm9E3tYZz7dc0sHzzkj0KYv11wcLUZ7KrW5kHHFTUZ+VcHe6tUfi7DPaBcJV68
> sy1nwhsiBHyBb6ekj/TIQyyznGZ2VWBGsisFw++Cdqlk1KafeBd5NpDnbY7gsC0O
> pmdrqvghc3LqJi1gSOVBV29CsrRVRo9ajB4i7GqIW6flwK2/n25jC6ameXSbz4I=
> =/65f
> -END PGP SIGNATURE-
> --
> Live Security Virtual Conference
> Exclusive live event will cover all the ways today's security and 
> threat landscape has changed and how IT managers can respond. Discussions 
> will include endpoint security, mobile security and the latest in malware 
> threats. 
> http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/___
> Cosign-discuss mailing list
> Cosign-discuss@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/cosign-discuss


--
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
___
Cosign-discuss mailing list
Cosign-discuss@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/cosign-discuss


Re: [Cosign-discuss] Multiple factor bug

2012-09-19 Thread Jason Noble
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Thanks for the quick response!

- --Jason

On 9/19/12 11:11 AM, Andrew Mortensen wrote:
> Thanks for the patch. I looked back through the history of that
> code, and it's always behaved that way, showing the login screen if
> any factor execution fails.
> 
> I don't see any reason why it should continue to, though. A check
> after the factorlist loop ensures that the user authenticated
> somehow. I've committed the patch to the master branch.
> 
> andrew
> 
> 
> On Sep 18, 2012, at 4:22 PM, Jason Noble 
> wrote:
> 
> I believe I have found a bug in the way factors are processed in 
> cosign.cgi. The manpage has the following documentation:
> 
> If authentication is successful, the external authenticator writes
> the factor name on stdout (file descriptor 1) and exits with a
> value of 0. If an error occurs, the external authenticator writes
> an error message on stdout and exits with a value of 1. If the
> user’s password has expired, the external authenticator writes an
> error message on stdout and exits with a value of 2. All other exit
> values are reserved for future use.
> 
> From that documentation, I would assume that the following lines
> in cosign.conf would allow a login from factor1 *or* factor2 so
> long as one of them exited with code 0 and wrote the factor name on
> stdout.
> 
> factor /usr/local/lib/cosign/factor/factor1 login password factor
> /usr/local/lib/cosign/factor/factor2 login password
> 
> I find this to not be the case. I believe the goto loginscreen is 
> being called prematurely, causing the for loop over the factors to
> be terminated as soon as a single factor fails. I have tested the 
> attached patch and it provides the behavior I was expecting, where 
> valid credentials supplied for factor1 *or* factor2 result in a 
> successful login. I submit this patch for the review of the Cosign 
> maintainers.
> 
> Cheers, Jason
>> --
>>
>> 
Live Security Virtual Conference
>> Exclusive live event will cover all the ways today's security and
>>  threat landscape has changed and how IT managers can respond.
>> Discussions will include endpoint security, mobile security and
>> the latest in malware threats.
>> http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/___
>>
>> 
Cosign-discuss mailing list
>> Cosign-discuss@lists.sourceforge.net 
>> https://lists.sourceforge.net/lists/listinfo/cosign-discuss
> 
> 
-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.17 (Darwin)
Comment: GPGTools - http://gpgtools.org
Comment: Using GnuPG with Mozilla - http://www.enigmail.net/

iQEcBAEBAgAGBQJQWegMAAoJEFBPX7xqwa0X4ukH/A3jjMGREubOSwlfxieMw9fT
aOsQn1l1aK3pRurEqEb42GzPIEL2uocqz/Tp0hduh38a4YA4c1vp4fHT3qVBFEy7
YD+tomy1t8oEqbZeovYPuxfVuisuPe3XYaurcYGEGZRJYUkJ0HJT8r5a3Swo7SsD
nZyBJ/ya5alwy1yFsFnOlORIRid70wuocCi7eeIYIHZLH0naE0bF6L8KvP/BVFY3
CYv2mLQQlhvt9xZaxZpQ2hXdoKHtiqgrgCOnFfvTqbujsqCkd1TXewR2IiQb1t9D
YgmpOYjrbauroIALO67uSLvIVBXGQSF6q/C+DOzanm4W//cCp27WBgybbNSSa3o=
=39i/
-END PGP SIGNATURE-

--
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
___
Cosign-discuss mailing list
Cosign-discuss@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/cosign-discuss


Re: [Cosign-discuss] Multiple factor bug

2013-04-23 Thread Bennett, Steve
Hi Andrew,

I'm just putting up some new CoSign servers (trying to get out of the 
"CoSign-shaped hole" that I dug myself :-), and I thought I'd make sure that I 
had the fixed functionality referred to in this bug report (it could be really 
useful to us).
I can't see the fix applied in Git. Is this my incompetence at using Git (quite 
possible, really), or has the fix not been applied there?

Steve.

-Original Message-
From: Andrew Mortensen [mailto:and...@weblogin.org] 
Sent: 19 September 2012 16:11
To: Jason Noble
Cc: 
Subject: Re: [Cosign-discuss] Multiple factor bug

Thanks for the patch. I looked back through the history of that code, and it's 
always behaved that way, showing the login screen if any factor execution fails.

I don't see any reason why it should continue to, though. A check after the 
factorlist loop ensures that the user authenticated somehow. I've committed the 
patch to the master branch.

andrew


On Sep 18, 2012, at 4:22 PM, Jason Noble  wrote:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
> 
> I believe I have found a bug in the way factors are processed in 
> cosign.cgi. The manpage has the following documentation:
> 
> If authentication is successful, the external authenticator writes the 
> factor name on stdout (file descriptor 1) and exits with a value of 0.
> If an error occurs, the external authenticator writes an error message 
> on stdout and exits with a value of 1. If the user's password has 
> expired, the external authenticator writes an error message on stdout 
> and exits with a value of 2. All other exit values are reserved for 
> future use.
> 
> - From that documentation, I would assume that the following lines in 
> cosign.conf would allow a login from factor1 *or* factor2 so long as 
> one of them exited with code 0 and wrote the factor name on stdout.
> 
> factor /usr/local/lib/cosign/factor/factor1 login password factor 
> /usr/local/lib/cosign/factor/factor2 login password
> 
> I find this to not be the case. I believe the goto loginscreen is 
> being called prematurely, causing the for loop over the factors to be 
> terminated as soon as a single factor fails. I have tested the 
> attached patch and it provides the behavior I was expecting, where 
> valid credentials supplied for factor1 *or* factor2 result in a 
> successful login. I submit this patch for the review of the Cosign 
> maintainers.
> 
> Cheers,
> Jason
> -BEGIN PGP SIGNATURE-
> Version: GnuPG/MacGPG2 v2.0.17 (Darwin)
> Comment: GPGTools - http://gpgtools.org
> Comment: Using GnuPG with Mozilla - http://www.enigmail.net/
> 
> iQEcBAEBAgAGBQJQWNfoAAoJEFBPX7xqwa0XFgQH/0DaFEynGzysVFzz8ly/ckjE
> Ni4LrbUIWNTdZ5RkYXqy4tXz0cPn4mdXv06ySx0ulkfsQ9FLbBKwbPGGTbQeRD5g
> 0gJgoz4XTqrbh7StEg1eUci8R24wUdQrHpRHj0uYGd/oY7mAOx/D9Si5dflZFyzy
> tgJm9E3tYZz7dc0sHzzkj0KYv11wcLUZ7KrW5kHHFTUZ+VcHe6tUfi7DPaBcJV68
> sy1nwhsiBHyBb6ekj/TIQyyznGZ2VWBGsisFw++Cdqlk1KafeBd5NpDnbY7gsC0O
> pmdrqvghc3LqJi1gSOVBV29CsrRVRo9ajB4i7GqIW6flwK2/n25jC6ameXSbz4I=
> =/65f
> -END PGP SIGNATURE-
> ---
> ---
> Live Security Virtual Conference
> Exclusive live event will cover all the ways today's security and 
> threat landscape has changed and how IT managers can respond. 
> Discussions will include endpoint security, mobile security and the 
> latest in malware threats. 
> http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/_
> __
> Cosign-discuss mailing list
> Cosign-discuss@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/cosign-discuss


--
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and threat 
landscape has changed and how IT managers can respond. Discussions will include 
endpoint security, mobile security and the latest in malware threats. 
http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
___
Cosign-discuss mailing list
Cosign-discuss@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/cosign-discuss

--
Try New Relic Now & We'll Send You this Cool Shirt
New Relic is the only SaaS-based application performance monitoring service 
that delivers powerful full stack analytics. Optimize and monitor your
browser, app, & servers with just a few lines of code. Try New Relic
and get this awesome Nerd Life shirt! http://p.sf.net/sfu/newrelic_d2d_apr
___
Cosign-discuss mailing list
Cosign-discuss@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/cosign-discuss


Re: [Cosign-discuss] Multiple factor bug

2013-04-23 Thread Andrew Mortensen


On Apr 23, 2013, at 4:13 AM, "Bennett, Steve"  wrote:

> Hi Andrew,
> 
> I'm just putting up some new CoSign servers (trying to get out of the 
> "CoSign-shaped hole" that I dug myself :-), and I thought I'd make sure that 
> I had the fixed functionality referred to in this bug report (it could be 
> really useful to us).
> I can't see the fix applied in Git. Is this my incompetence at using Git 
> (quite possible, really), or has the fix not been applied there?

It's there:

<http://cosign.git.sourceforge.net/git/gitweb.cgi?p=cosign/cosign;a=blobdiff;f=cgi/cgi.c;h=3b55d19015f3c2e5815217b763a7fbf0deb429a5;hp=5c35f2778d39b31d9d2af8ef11a2104744c036e9;hb=63d20e90ce2915f300a973c3ab0be3f7178ed96a;hpb=8339e7b90e4632d3f5adb9c771b8538b86076cd7>

andrew



> 
> Steve.
> 
> -Original Message-
> From: Andrew Mortensen [mailto:and...@weblogin.org] 
> Sent: 19 September 2012 16:11
> To: Jason Noble
> Cc: 
> Subject: Re: [Cosign-discuss] Multiple factor bug
> 
> Thanks for the patch. I looked back through the history of that code, and 
> it's always behaved that way, showing the login screen if any factor 
> execution fails.
> 
> I don't see any reason why it should continue to, though. A check after the 
> factorlist loop ensures that the user authenticated somehow. I've committed 
> the patch to the master branch.
> 
> andrew
> 
> 
> On Sep 18, 2012, at 4:22 PM, Jason Noble  wrote:
> 
>> -BEGIN PGP SIGNED MESSAGE-
>> Hash: SHA1
>> 
>> I believe I have found a bug in the way factors are processed in 
>> cosign.cgi. The manpage has the following documentation:
>> 
>> If authentication is successful, the external authenticator writes the 
>> factor name on stdout (file descriptor 1) and exits with a value of 0.
>> If an error occurs, the external authenticator writes an error message 
>> on stdout and exits with a value of 1. If the user's password has 
>> expired, the external authenticator writes an error message on stdout 
>> and exits with a value of 2. All other exit values are reserved for 
>> future use.
>> 
>> - From that documentation, I would assume that the following lines in 
>> cosign.conf would allow a login from factor1 *or* factor2 so long as 
>> one of them exited with code 0 and wrote the factor name on stdout.
>> 
>> factor /usr/local/lib/cosign/factor/factor1 login password factor 
>> /usr/local/lib/cosign/factor/factor2 login password
>> 
>> I find this to not be the case. I believe the goto loginscreen is 
>> being called prematurely, causing the for loop over the factors to be 
>> terminated as soon as a single factor fails. I have tested the 
>> attached patch and it provides the behavior I was expecting, where 
>> valid credentials supplied for factor1 *or* factor2 result in a 
>> successful login. I submit this patch for the review of the Cosign 
>> maintainers.
>> 
>> Cheers,
>> Jason
>> -BEGIN PGP SIGNATURE-
>> Version: GnuPG/MacGPG2 v2.0.17 (Darwin)
>> Comment: GPGTools - http://gpgtools.org
>> Comment: Using GnuPG with Mozilla - http://www.enigmail.net/
>> 
>> iQEcBAEBAgAGBQJQWNfoAAoJEFBPX7xqwa0XFgQH/0DaFEynGzysVFzz8ly/ckjE
>> Ni4LrbUIWNTdZ5RkYXqy4tXz0cPn4mdXv06ySx0ulkfsQ9FLbBKwbPGGTbQeRD5g
>> 0gJgoz4XTqrbh7StEg1eUci8R24wUdQrHpRHj0uYGd/oY7mAOx/D9Si5dflZFyzy
>> tgJm9E3tYZz7dc0sHzzkj0KYv11wcLUZ7KrW5kHHFTUZ+VcHe6tUfi7DPaBcJV68
>> sy1nwhsiBHyBb6ekj/TIQyyznGZ2VWBGsisFw++Cdqlk1KafeBd5NpDnbY7gsC0O
>> pmdrqvghc3LqJi1gSOVBV29CsrRVRo9ajB4i7GqIW6flwK2/n25jC6ameXSbz4I=
>> =/65f
>> -END PGP SIGNATURE-
>> ---
>> ---
>> Live Security Virtual Conference
>> Exclusive live event will cover all the ways today's security and 
>> threat landscape has changed and how IT managers can respond. 
>> Discussions will include endpoint security, mobile security and the 
>> latest in malware threats. 
>> http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/_
>> __
>> Cosign-discuss mailing list
>> Cosign-discuss@lists.sourceforge.net
>> https://lists.sourceforge.net/lists/listinfo/cosign-discuss
> 
> 
> --
> Live Security Virtual Conference
> Exclusive live event will cover all the ways today's security and threat 
> landscape has changed and how IT managers can respond. Discussions will 
> include endpoint security, mobile security and the latest in malware threats. 
>