Possible security hole in racoon verified on FreeBSD using
racoon-20030711
Ralf Spenneberg
ralf at spenneberg.net
Tue Apr 6 22:18:03 PDT 2004
Hi,
while testing racoon on Linux (based on the ported ipsec-tools) the
following issue appeared:
Racoon did not verify the RSA Signatures during Phase 1 in either main
or aggressive mode.
Authentication was possible using a correct certificate and a wrong
private key.
I have verified the below problem using racoon-20030711 on FreeBSD 4.9. I will test
it using the SNAP Kit but suspect it to be vulnerable, too.
Probably other implementations like racoon and MacOSX are vulnerable, too.
On Linux the issue was resolved with the attached patch.
Could you look into this?
I would like to publish a Bugtraq report after the weekend, provided that you have confirmed
that either your racoon is not vulnerable or you have patches available.
Regards,
Ralf
--
Ralf Spenneberg
UNIX/Linux Trainer and Consultant, RHCE, RHCX
Waldring 34 48565 Steinfurt Germany
Fon: +49(0)2552 638 755 Fax: +49(0)2552 638 757
Mobil: +49(0)177 567 27 40
Markt+Technik Buch: Intrusion Detection für Linux Server
Addison-Wesley Buch: VPN mit Linux
IPsec-Howto: http://www.ipsec-howto.org
IPsec/PPTP Kernels for Red Hat Linux: http://www.spenneberg.com/.net/.org/.de
Honeynet Project Mirror: http://honeynet.spenneberg.org
Snort Mirror: http://snort.spenneberg.org
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Dies ist ein digital signierter Nachrichtenteil
Url : http://lists.freebsd.org/pipermail/freebsd-security/attachments/20040407/53a9df78/attachment.bin
More information about the freebsd-security
mailing list