Subject: | session id: highly predictable and collisions-prone |
Date: | Wed, 10 Dec 2008 08:59:32 +0200 |
To: | bug-User-Simple [...] rt.cpan.org |
From: | Damyan Ivanov <dmn [...] debian.org> |
Hi Gunnar,
I know you'll read this via the Debian channels too, but here it is,
documenting the issue also in RT.
----- Forwarded message from "Eugene V. Lyubimkin"
<jackyf.devel@gmail.com> -----
From: "Eugene V. Lyubimkin" <jackyf.devel@gmail.com>
To: Debian Bug Tracking System <submit@bugs.debian.org>
X-Mailer: reportbug 3.47
Date: Tue, 09 Dec 2008 23:15:59 +0200
Subject: Bug#508312: libuser-simple-perl: session id: highly predictable and
collisions-prone
Reply-To: "Eugene V. Lyubimkin" <jackyf.devel@gmail.com>,
508312@bugs.debian.org
Package: libuser-simple-perl
Version: 1.40-1
Severity: important
Tags: security, patch
Session id, computed by this package, is just md5 of unix timestamp at
the call moment. Thus, this session id can be simply bruteforced by
attacker if he knows user authorizing time approximately. And, this is
also means that two happy users that authorize in the same second
will have the identical session id.
I would suggest adding login and password to timestamp, and only then do
md5(...) (can be considered as a simplest patch :)), this approach will
fix problems mentioned above.
-- System Information:
Debian Release: 5.0
APT prefers unstable
APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Kernel: Linux 2.6.28-rc7jackyf (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
Versions of packages libuser-simple-perl depends on:
ii libdate-calc-perl 5.4-5+b1 Perl library for accessing dates
ii libdbi-perl 1.607-1 Perl5 database interface by Tim Bu
ii perl 5.10.0-18 Larry Wall's Practical Extraction
libuser-simple-perl recommends no packages.
libuser-simple-perl suggests no packages.
-- no debconf information
Show quoted text
----- End forwarded message -----
What I can add to this is that including the login and the password to
the hash seems right. I'd also add a bit of randomness, using rand().
If you don't have time to fix this, please tell me what would be the
preferred way, so I can prepare a patch for you.
--
dam JabberID: dam@jabber.minus273.org
Message body not shown because it is not plain text.