Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CABBoStiTED9CRxFBD=Y521XyD=O5EU6Bh6gv1GohAsR2idhqyg@mail.gmail.com>
Date: Tue, 17 Nov 2020 09:10:00 -0500
From: Ana McTaggart <amctagga@...hat.com>
To: Ilya Dryomov <idryomov@...hat.com>, oss-security@...ts.openwall.com
Subject: CVE-2020-25677 ceph: CEPHX_V2 replay attack protection lost

Dear all,
cephx authentication protocol does not verify ceph clients correctly, and
is vulnerable to replay attacks in nautilus and later. An attacker with
access to the Ceph cluster network can use this vulnerability to
authenticate with ceph service, via a packet sniffer. This allows them to
perform actions allowed by the ceph service. This is a reintroduction of
CVE-2018-1128[1], affecting msgr2 protocol. msgr 2 protocol is used for all
communication except for older clients that do not support msgr2 protocol.
msgr1 protocol is not affected.

This was introduced in commit to msgr2 321548010578 ("mon/MonClient: skip
CEPHX_V2 challenge if client doesn't support it") , due to commit
c58c5754dfd2 ("msg/async/ProtocolV1: use AuthServer and AuthClient") . This
results in nautilus and ceph being affected because commit c58c5754dfd2
wasn't backported to nautilus, and although msgr1 isn't affected in
nautilus, msgr 2 is the default. This made it so authorizer challenges
could be skipped for peers which did not support CEPHX_V2, unfortunately
making it so authorizer challenges are skipped for all peers in both msgr 1
and msgr2 cases, disabling the protection that was put in place in commit
f80b848d3f83 ("auth/cephx: add authorizer challenge", CVE-2018-1128).

Proposed Patch:
See attached.

We have assigned it a CVE of CVE-2020-25677 at Red Hat.

Credits to Ilya Dryomov

[1]https://www.cvedetails.com/cve/CVE-2018-1128/

Ana McTaggart

Red Hat Product Security

Red Hat Remote <https://www.redhat.com>


secalert@...hat.com for urgent response


amct@...hat.com


M: 7742790791     IM: amctagga


Pronouns:They/Them/Theirs

Content of type "text/html" skipped

Download attachment "0003-mon-MonClient-bring-back-CEPHX_V2-authorizer-challen.patch" of type "application/x-patch" (3959 bytes)

Download attachment "0001-msg-async-ProtocolV1-resurrect-include-MGR-as-servic.patch" of type "application/x-patch" (1505 bytes)

Download attachment "0002-msg-async-ProtocolV1-resurrect-implement-cephx_-requ.patch" of type "application/x-patch" (2918 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.