Date: Thu, 13 Feb 2014 01:01:20 -0500 From: Red Hat Security Response Team <secalert@redhat.com> To: pierre.carrier@airbnb.com Cc: bugbusters@freebsd.org, product.security@airbnb.com, pkgsrc-security@netbsd.org, rory@berecruited.com Subject: [engineering.redhat.com #278019] Insufficient salting in the net-ldap Ruby gem Message-ID: <rt-4.0.13-24394-1392271280-1668.278019-5-0@engineering.redhat.com> In-Reply-To: <CAM7LUF4MuEJ0DWKhDZ=P=Z7HME_F18a8K4LeSehccmPQP8xHpg@mail.gmail.com> References: <RT-Ticket-278019@engineering.redhat.com> <CAM7LUF4MuEJ0DWKhDZ=P=Z7HME_F18a8K4LeSehccmPQP8xHpg@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Wed Feb 12 15:03:04 2014, pierre.carrier@airbnb.com wrote: > Hello, > > SSHA passwords generated by the net-ldap Ruby gem use a salt between > "0" and "999", only providing 10 bits of entropy. > > This is an attack vector, making attacks based on rainbow tables > significantly easier than with a strong salt. Thanks for sending this. >From the CVE perspective this is a classic "intended security protection that fails to work as intended", the point of salting is to increase workload enough to make pre-computation and storage of the results difficult to impossible, a factor of 1000 is simply not enough in the modern word of GPU's and 4TB hd's and rainbow tables with chains. Please use CVE-2014-0083 for this issue. Also can an issue be opened upstream if it hasn't already been done? Thanks. > https://github.com/ruby-ldap/ruby-net- > ldap/blob/master/lib/net/ldap/password.rb#L29 > > This E-mail is sent to the current upstream maintainer and all vendors > that distribute a version of that gem. > Your version might not be affected; if not, sorry for the noise. > > Best, > -- Kurt Seifried Red Hat Security Response Team (SRT) PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?rt-4.0.13-24394-1392271280-1668.278019-5-0>