-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

"C. Dominik Bodi" <[email protected]> writes:

> The update-initramfs hook script for mandos client adds several
> files into the initrd that are not necessary for its operation.

Yes, that is indeed a bug.  Very sorry about that.  We will fix this
right away.

> One of the files being added causes a severe security risk for other
> mandos client in case the client acts as a mandos server, as well.

I must confess that I do not understand how this can be the case.

(I guess it would be terrible if a client would, by some mistake, be
set up to be its own Mandos server, but that would never work anyway,
so nobody is supposed to even *have* that configuration.)

> The superfluous files can be found in
> initrd_root/etc/conf/conf.d/mandos/

Yes, I see them.  We'll change this now to just copy the needed files
(or file, as it happens).

> [...], if the mandos server package is installed on the same
> computer, the /etc/mandos/mandos.conf and /etc/mandos/clients.conf
> will be added to the initrd, as well.

Yes.  This was, of course, not intended, and we will fix it now.

> The latter contains the fingerprints of other mandos clients.
> If the initrd file was compromised, it would be very easy to to set
> up a rogue mandos server in order to snoop the other client's disk
> encryption passwords.

I do not see how this would be possible.  If someone got a copy of
/etc/mandos/clients.conf, it would *not* get them the disk encryption
passwords unless they *also* got the seckey.txt from the client.

Sure, this is bad, and we will fix this right away, but I do not think
this is a "root security hole".  It cannot be exploited unless there
is *also* a root compromise or a hardware seizure on *both* the server
and the client - i.e. no worse than without disk encryption, at least.
And if only *one* of the server or client is compromised, there is no
problem.

It is *not* possible to "snoop" a client's disk encryption password by
being a "rogue" Mandos server.  The Mandos server receives nothing
except the client's public key, and a public key never made an
attacker any happier.

If you think I'm wrong, please explain in a little more detail how an
attack would be constructed with this bug in place.  (But I *am*
fixing this bug immediately.)

/Teddy Hogeborn

- -- 
The Mandos Project
http://www.fukt.bsnet.se/mandos
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkrfjQ8ACgkQOWBmT5XqI91sVQCdEAJkudrGWWjlimmELf0c/84b
PIQAni0hgEHNH/IkUq4KXU1dgoxcD+09
=r57Z
-----END PGP SIGNATURE-----



--
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]

Reply via email to