Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Not setting http.secretkey yields undefined behaviour #567

Closed
olifre opened this issue Aug 18, 2017 · 3 comments
Closed

Not setting http.secretkey yields undefined behaviour #567

olifre opened this issue Aug 18, 2017 · 3 comments

Comments

@olifre
Copy link
Contributor

olifre commented Aug 18, 2017

I am using xrootd 4.6.1 with xrdhttpvoms 0.2.4 from EPEL on a CentOS 7 system.

Not setting http.secretkey but "using" it (by activating http.selfhttps2http and / or desthttps no) will not cause a startup failure or error message, but lead to creation of random tokens, potentially including non-ASCII characters.
This breaks on the client side, since the redirection URI can not be accessed.
Also, that is probably use of unintialized memory - might be exploitable?

@olifre olifre changed the title Not setting http.secretkey yields to undefined behaviour Not setting http.secretkey yields undefined behaviour Aug 18, 2017
@ffurano
Copy link
Contributor

ffurano commented Aug 21, 2017

Hi,
I was sure I had answered, obviously I was wrong. Sorry for the delay then.

I'd say that you spotted a minor bug, that allows to define a configuration that basically rejects all the clients by distributing broken signatures to them. A sysadmin would immediately understand that his system is totally broken, so I believe that the exploitability of such a wrong combination is insignificant. Moreover the bug does not prevent any kind of correct usage/config of the framework.

I will fix it in the next week or so

@ffurano
Copy link
Contributor

ffurano commented Sep 14, 2017

#579 should fix this

@abh3
Copy link
Member

abh3 commented Sep 15, 2017

Merged fix.

@abh3 abh3 closed this as completed Sep 15, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants