Hi again,

Jonathan Nieder wrote:

> In its implementation of CRAM-MD5 authentication, svnserve uses
> a challenge of
>
>       < nonce . time @ hostname >
>
> After the fix to bug#285708, the nonce is not actually random, but is
> just the current time a few moments before the later "time" component
> is generated.
>
> After intercepting a client's response to this challenge, I can reuse
> that client's credentials, provided I am fast or lucky enough to time
> my connection so as to get the same challenge (nonce and time).
>
> The "nonce" and "time" are usually not equal and have fairly high
> (1-tick --- usually 10-microsecond) resolution, so in practice this
> might be hard to do.  Even so, I would be happier with the following
> patch applied.

Have you considered this request?  If the proposed fix isn't suitable,
would another one be?

Another detail I missed before: nowadays apr_generate_random_bytes()
reads from urandom, not /dev/random, so this would not cause
bug#285708 to come back.

If you think the change is a bad idea, I'd be happy to tag it wontfix
so it can be off my radar.

Thanks,
Jonathan



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to