Bug#230999: [CAN-2003-0987] mod_digest for Apache does not properly verify the nonce of a client response by using a AuthNonce secret.

2004-02-04 Thread Matt Zimmerman
On Tue, Feb 03, 2004 at 10:37:33PM +0100, J.H.M. Dassen (Ray) wrote:

 Package: apache
 Version: 1.3.29.0.1-5
 Severity: grave
 Tags: security patch
 
 Candidate: CAN-2003-0987
 URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0987
 Phase: Assigned (20031216)
 Category: SF
 Reference:
 CONFIRM:http://www.mail-archive.com/dev@httpd.apache.org/msg19007.html
 Reference:
 CONFIRM:http://www.mail-archive.com/dev@httpd.apache.org/msg19014.html
 
 mod_digest for Apache does not properly verify the nonce of a client
 response by using a AuthNonce secret.
 
 
 Current Votes:
 None (candidate not yet proposed)

Can anyone explain the true impact of this bug?  The fix looks rather
intrusive.

-- 
 - mdz




Bug#230999: [CAN-2003-0987] mod_digest for Apache does not properly verify the nonce of a client response by using a AuthNonce secret.

2004-02-04 Thread J.H.M. Dassen (Ray)
On Tue, Feb 03, 2004 at 14:05:25 -0800, Matt Zimmerman wrote:
  mod_digest for Apache does not properly verify the nonce of a client
  response by using a AuthNonce secret.

 Can anyone explain the true impact of this bug?

I'm not sure, but this is my best guess/interpretation from googling around
a bit:
(http://frontier.userland.com/stories/storyReader$2159 - HTTP Authentication
Schemes;
RFC 2617 -- HTTP Authentication: Basic and Digest Access Authentication,
http://zvon.org/tmRFC/RFC2617/Output/longContents.html)

Apache supports Digest Authentication, a method of authentication in which
the password isn't transmitted in plain as it is with Basic access
authentication. 

(Digest Authentication is intended to replace the Basic mechanism. It is not
a strong authentication mechanism compared to public key based mechanisms
(say Basic authentication over SSL/TLS), but it is considered stronger than
e.g. CRAM-MD5.)

Digest authentication in its basic form is vulnerable to replay attacks
(RFC, sec. 4.5). It can be protected against replay attacks by employing
server-generated nonce values.

The issue at hand is that Apache's mod_digest implementation of Digest
Authentication implements this protection against replay attacks incorrectly
or incompletely. A web server running Apache where mod_digest is used for
authentication may thus unexpectedly be vulnerable to replay attacks.

(In an advisory, I'd point to the security considerations in the RFC and
strongly recommend the use of SSL/TLS over plain HTTP with Digest
Authentication)

Ray
-- 
Lately, the only thing keeping me from being a serial killer is my distaste
for manual labor.
Dilbert in
http://www.unitedmedia.com/comics/dilbert/archive/dilbert-20010107.html