Errata:

s/Tigera/CyberArk Labs/g

I misread the sources. Thanks to Santiago for correcting me.

Maria

On 3/10/23 00:09, Maria Matejka via Bird-users wrote:
Hello!

In fact, I think that Tigera should have never submitted this CVE as it makes not sense at all. Adding the fact that nobody from Tigera has ever reached to us regarding this CVE, this simply isn't a legit CVE.

I'll submit a request to reject this CVE. Thank you for pointing to it.

Maria

On 3/9/23 09:02, Radu CARPA wrote:
Hi,

I allow myself to jump on this discussion.
That CVE report is about attacking a kubernetes cluster running Calico (see the link in the `References to Advisories, Solutions, and Tools` section in the NIST CVE). By default, calico doesn't require password authentication for BGP connections. However, that can be enabled using the `nodeMeshPassword` on the `BGPConfiguration` resource. It can also be enabled on peers outside the cluster using the `password` field of the `BGPPeer` custom resource. I'm not sure if it's possible to enable it globally for the listening socket though. Moreover, Calico uses a self-patched, old, version of Bird. I believe 1.6.8.

I "think" that CVE was miss-labeled and shouldn't refer to bird as the source of the problem.
I personally use Password authentication with bird without issues.

Regard,
Radu

On 3/9/23 08:15, Ondrej Filip wrote:
On 09. 03. 23 5:14, William wrote:
On 09/03/2023 13:41, Robert Scheck wrote:
Hello,

Hi!


with https://bugzilla.redhat.com/show_bug.cgi?id=2176483, Red Hat pointed me today to CVE-2021-26928. https://nvd.nist.gov/vuln/detail/CVE-2021-26928 contains a reference to BIRD 2.0.7, but no link related to BIRD upstream.

Do you see any chance for some comments on it (at least here)? Not sure if
MITRE adds it then as references at CVE-2021-26928.

I have a PDF of the Bird help documentation that I saved in 2019 (Fossies) that lists password authentication mechanisms as per RFC2385 with extra options for BSD systems.  I'll defer to the Dev team on this for the final word, but someone has some crossed wires here.

Yes, this functionality was added in 1.0.12 (12 Nov 2008). So I do not understand this CVE.

    Ondrej



Thank you.


Regards,
  Robert

Regards,
William


Reply via email to