Re: BUG #5687: RADIUS Authentication issues - Mailing list pgsql-bugs

From Tom Lane
Subject Re: BUG #5687: RADIUS Authentication issues
Date
Msg-id 14007.1286059961@sss.pgh.pa.us
Whole thread Raw
In response to BUG #5687: RADIUS Authentication issues  ("Alan DeKok" <aland@freeradius.org>)
Responses Re: BUG #5687: RADIUS Authentication issues
Re: BUG #5687: RADIUS Authentication issues
List pgsql-bugs
"Alan DeKok" <aland@freeradius.org> writes:
> CheckRADIUSAuth() in src/backend/libpq/auth.c is subject to spoofing attacks
> which can force all RADIUS authentications to fail.
> ...
> The source IP/port/RADIUS ID && authentication vector fields are checked
> *after* the socket is closed.  This allows an attacker to "race" the RADIUS
> server, and spoof the response, forcing PostgreSQL to treat the
> authentication as failed.

[ scratches head ... ]  I don't see the problem.  AFAICS the "verify
packet" code is just looking at local storage.  Where is the spoofing
possibility, and why would delaying the socket close accomplish
anything?

            regards, tom lane

pgsql-bugs by date:

Previous
From: Tom Lane
Date:
Subject: Re: src/tools/fsync/test_fsync.c does not compile
Next
From: Craig Ringer
Date:
Subject: Re: Postgres 9.0 crash on win7