Uploaded image for project: 'JGroups'
  1. JGroups
  2. JGRP-1487

AUTH: X509Token Authentication is vulnerable to replay attacks

XMLWordPrintable

    • Icon: Bug Bug
    • Resolution: Done
    • Icon: Major Major
    • 3.5
    • 3.0.9
    • None

      In the implementation of X509Token Authentication

      The auth_value is enrypted with the certificate within the keystore and
      during verification encrypted auth value is decrypted with the private key
      compared against the orignial auth value.

      This implementation is prone to replay attacks, that is
      any user with out having any knowledge of the auth value can join the group
      by replaying the enrypted auth value captured in earlier sessions.

            ttarrant@redhat.com Tristan Tarrant
            sreenivas.chinimilli sreenivas chinimilli (Inactive)
            Votes:
            1 Vote for this issue
            Watchers:
            5 Start watching this issue

              Created:
              Updated:
              Resolved: