-
Notifications
You must be signed in to change notification settings - Fork 2.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Default configuration is vulnerable to challstr replay attack, granting shell access. #7881
Comments
Awkward. We'll have to assess how to best deal with this problem. Unfortunately, none of your suggested solutions appear to fully fix the problem (not even Requiring I'll have to think about how to best solve this problem. Can you talk to us on https://psim.us/devdiscord ? |
We already check for the date in which the login was originally performed, and thus can rely on it to minimize the impact of exploitability. It's likely that this was already considered when the login system was first designed, but the time window allowed is a bit larger than 1 day, which, is not very useful given the large impact this issue would have if exploited. Also note that this issue requires Alice to act as MITM. We could, and should, make sysop logins valid just once(*), but eavesdropping opens the door to acquiring sysop powers even if the login data were valid for a unique time.
Going further, this would apply to the server own sysops as well. But it has always been standard practice that people with such high level of system access in informatic systems shouldn't be logging in all the time, so... loss of "login remember" feature for them shouldn't be that big of a deal? Just switch to an alt? |
I discussed this with @xfix and we agreed that the best mitigation would be to use IP validation if |
That wouldn't do anything for this vuln, which is a MitM attack across two different servers, which would have non-shared blacklists (and non-shareable: one of the servers is an untrusted attacker).
Sysops are often necessary to deal with problems in servers where the server admin is afk, and no one around has the ability to use If there were a vulnerability specific to the sysop backdoor, I would consider defaulting it to off, but this vuln is unrelated to the sysop backdoor. |
There seems to be a misunderstanding about what the backdoor is for. It's for situations like this:
We prefer for escalations that aren't literally "ban the server" to exist. Security-wise, it's identical to promoting my account to admin for your server. By itself, it's not a vulnerability and there's no way for it to be a vulnerability. |
I do wonder, I'm somewhat concerned about sysops having console access, could that permission be removed? If a sysop were to be compromised they could run Principle of least privilege, pretty much, I don't think sysops need to run arbitrary code on other servers without server admins knowing about it, and their accounts can be compromised still, even considering we do have 2FA for sysops. |
The following attack is plausible if Charlie's server is running with the default configuration:
Config.legalhosts
because it's undocumentedConfig.backdoor
because the README doesn't give him any warningPossible fixes include:
backdoor = false
by default because it's the right thing to dobackdoor
and help beginnerslegalhosts
and set it to onlylocalhost
by defaultI can work on the last one at least. I haven't taught myself containers yet and it's a good excuse.
The text was updated successfully, but these errors were encountered: