Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Always fall back to reverse DNS if trusted #844

Merged
merged 2 commits into from
Oct 18, 2018

Conversation

bbockelm
Copy link
Contributor

Whenever reverse DNS is trusted, this enables the "historical" configuration where the IP address of the connected socket is considered for reverse resolution (and the remote server's DN is compared against the resulting hostname).

IMHO, this is significantly more dangerous than "traditional' reliance on reverse DNS for non-Xrootd cases. Any attacker that is performing a MITM is able to force the client to accept any valid host certificate.

So, if the attacker controlling DNS could force foo.example.com to resolve to attacker-controlled IP address 1.2.3.4 with reverse resolution of badguy.io, the client would accept the connection as long as badguy.io has a certificate from a valid authority.

Fix #841

Whenever we have enabled trust DNS, we should fall back to using
reverse DNS in all cases, not just when an IP address is given.

This provides backward compatibility with the case where the client
uses a DNS alias directly but the server is missing the SAN for
that DNS alias (instead the server only has the canonical name
for the IP address in the DN).
@abh3
Copy link
Member

abh3 commented Oct 18, 2018

Well, the answer is yes but the unfortunate problem is we don't have a good way to get around it in an expeditious way. Fortunately, where this is needed for x509 based XRootD TPC is for source selection and that is inherently much less dangerous since if there is any kind of spoofing the checksum should catch it in the end. It also helps that XRootD TPC only allows pull requests which minimizes (though does not eliminate) the severity of the exposure.

@abh3 abh3 merged commit 9b957ca into xrootd:master Oct 18, 2018
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

xrdcopy ignores subject alternative names from the x509 host certificate
2 participants