101714 2003-05-16  22:37  /55 rader/ NetExpress <netexpress@tiscali.it>
Importerad: 2003-05-16  22:37  av Brevbäraren
Extern mottagare: Pen-Test@securityfocus.com
Extern mottagare: bugtraq@securityfocus.com
Mottagare: Bugtraq (import) <4925>
Ärende: bsdbsdftpd-6.0-ssl-0.6.1-1 attack allows remote users identification
------------------------------------------------------------
Product bsbsdftpd-6.0-ssl-0.6.1-1 http://bsdftpd-ssl.sc.ru/

During a pen-test we have notice how is easy to identify valid users
on vulnerable systems, through a simple timing attack.

When I try to connect to ftp without ssl using a unreal user with bad 
password I get
immediatly response of incorrect login, when I use real user with bad
password I get 2 second of wait before get message of incorrect login.

It seems to be very nice to the recent CAN-2003-0190 about OpenSSH/PAM
timing attack allows remote users identification

I have tested this on Linux RH 7.3 and RH 8.0

I belive the vulnerability is easy to exploit and may have high
severity, if combined with poor password policies and other security
problems that allow local privilege escalation.


Alessandro Fiorenzi

a.fiorenzi@infogroup.it aka netexpress

*------------------------------------------------------------------------
INFOGROUP S.P.A                 http://www.infogroup.it

-------------------------------------------------------------------------
DR. FIORENZI ALESSANDRO *

Consulente Tribunale Firenze - sicurezza informatica -
System Administrator
Socio CLUSIT <file:///home/fiore/signature/www.clusit.it>, ALSI 
<file:///home/fiore/signature/www.alsi.it>


Tel : +39.055.43.65.742
CE : +39.335.64.144.77
@Email : a.fiorenzi@infogroup.it
PGP Key: http://www.infogroup.it/ds/fiorenzi.asc

/-------------------------------------------------------------------------
            *"Faber est suae quisque fortunae" *
-------------------------------------------------------------------------/

//
(101714) /NetExpress <netexpress@tiscali.it>/(Ombruten)
Kommentar i text 101727 av Damian Gerow <damian@sentex.net>
101727 2003-05-17  08:03  /20 rader/ Damian Gerow <damian@sentex.net>
Importerad: 2003-05-17  08:03  av Brevbäraren
Extern mottagare: NetExpress <netexpress@tiscali.it>
Mottagare: Bugtraq (import) <4930>
Kommentar till text 101714 av NetExpress <netexpress@tiscali.it>
Ärende: Re: bsdbsdftpd-6.0-ssl-0.6.1-1 attack allows remote users identification
------------------------------------------------------------
Thus spake NetExpress (netexpress@tiscali.it) [16/05/03 16:42]:
> Product bsbsdftpd-6.0-ssl-0.6.1-1 http://bsdftpd-ssl.sc.ru/
> 
> During a pen-test we have notice how is easy to identify valid users on
> vulnerable systems, through a simple timing attack.
> 
> When I try to connect to ftp without ssl using a unreal user with bad 
> password I get
> immediatly response of incorrect login, when I use real user with bad
> password I get 2 second of wait before get message of incorrect login.
> 
> It seems to be very nice to the recent CAN-2003-0190 about OpenSSH/PAM
> timing attack allows remote users identification
> 
> I have tested this on Linux RH 7.3 and RH 8.0

I just tried this out on a FreeBSD system (4.8-RC x2), and I get the
same response time.  Are you sure this is directly related to the ftp
daemon, or is it a PAM issue?
(101727) /Damian Gerow <damian@sentex.net>/(Ombruten)
Bilaga (application/pgp-signature) i text 101728
Kommentar i text 101729 av NetExpress <netexpress@tiscali.it>
Kommentar i text 101735 av Mika =?iso-8859-15?Q?Bostr=F6m?= <bostik@lut.fi>
101728 2003-05-17  08:03  /8 rader/ Damian Gerow <damian@sentex.net>
Importerad: 2003-05-17  08:03  av Brevbäraren
Extern mottagare: NetExpress <netexpress@tiscali.it>
Mottagare: Bugtraq (import) <4931>
Bilaga (text/plain) till text 101727
Ärende: Bilaga till: Re: bsdbsdftpd-6.0-ssl-0.6.1-1 attack allows remote users identification
------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (FreeBSD)

iD8DBQE+xU4mFz2c9rhB8UIRAlV/AJwJM/R4i35yr6B4dGTbycjisqFbVQCfZqlX
H8lAz1mFvrPwWrLmFNIujAg=
=dZm2
-----END PGP SIGNATURE-----
(101728) /Damian Gerow <damian@sentex.net>/---------
101729 2003-05-17  08:45  /42 rader/ NetExpress <netexpress@tiscali.it>
Importerad: 2003-05-17  08:45  av Brevbäraren
Extern mottagare: Damian Gerow <damian@sentex.net>
Mottagare: Bugtraq (import) <4932>
Kommentar till text 101727 av Damian Gerow <damian@sentex.net>
Ärende: Re: bsdbsdftpd-6.0-ssl-0.6.1-1 attack allows remote users identification
------------------------------------------------------------
Damian Gerow wrote:

>Thus spake NetExpress (netexpress@tiscali.it) [16/05/03 16:42]:
>  
>
>>Product bsbsdftpd-6.0-ssl-0.6.1-1 http://bsdftpd-ssl.sc.ru/
>>
>>During a pen-test we have notice how is easy to identify valid users on
>>vulnerable systems, through a simple timing attack.
>>
>>When I try to connect to ftp without ssl using a unreal user with bad 
>>password I get
>>immediatly response of incorrect login, when I use real user with bad
>>password I get 2 second of wait before get message of incorrect login.
>>
>>It seems to be very nice to the recent CAN-2003-0190 about OpenSSH/PAM
>>timing attack allows remote users identification
>>
>>I have tested this on Linux RH 7.3 and RH 8.0
>>    
>>
>
>I just tried this out on a FreeBSD system (4.8-RC x2), and I get the same
>response time.  Are you sure this is directly related to the ftp daemon, or
>is it a PAM issue?
>  
>
You are right, is the same preoblem has affected OpenSSH/PAM timing 
attack about which Marco Ivald  from MediaService has post the bug and 
the solution.

I have been in touch with Marco Ivaldi, he has found that  is the
same  kind of problem, an the same soltion, but is not really goot to
get this  problem on the default installation . I mailed to the
author but  I get  no response

For the solution follow the same present on 
http://lab.mediaservice.net/advisory/2003-01-openssh.txt

Alessandro Fiorenzi
(101729) /NetExpress <netexpress@tiscali.it>/(Ombruten)
101735 2003-05-17  20:21  /36 rader/ Mika =?iso-8859-15?Q?Bostr=F6m?= <bostik@lut.fi>
Importerad: 2003-05-17  20:21  av Brevbäraren
Extern mottagare: NetExpress <netexpress@tiscali.it>
Extern mottagare: bugtraq@securityfocus.com
Externa svar till: bostik@lut.fi
Mottagare: Bugtraq (import) <4936>
Kommentar till text 101727 av Damian Gerow <damian@sentex.net>
Ärende: Re: bsdbsdftpd-6.0-ssl-0.6.1-1 attack allows remote users identification
------------------------------------------------------------
On Fri, 16 May 2003, Damian Gerow wrote:
> Thus spake NetExpress (netexpress@tiscali.it) [16/05/03 16:42]:
> > Product bsbsdftpd-6.0-ssl-0.6.1-1 http://bsdftpd-ssl.sc.ru/
> > 
> > During a pen-test we have notice how is easy to identify valid users on
> > vulnerable systems, through a simple timing attack.
> > 
> > When I try to connect to ftp without ssl using a unreal user with bad 
> > password I get
> > immediatly response of incorrect login, when I use real user with bad
> > password I get 2 second of wait before get message of incorrect login.
> > 
> > It seems to be very nice to the recent CAN-2003-0190 about OpenSSH/PAM
> > timing attack allows remote users identification
> > 
> > I have tested this on Linux RH 7.3 and RH 8.0
> 
> I just tried this out on a FreeBSD system (4.8-RC x2), and I get the same
> response time.  Are you sure this is directly related to the ftp daemon, or
> is it a PAM issue?

  Looking back two weeks in BugTraq archives, I see the following
posting:
http://www.securityfocus.com/archive/1/320270/2003-04-30/2003-05-06/0

  This suggests that many more programs are similarly vulnerable,
because they take shortcuts. After all, it is quite common and
generally even good practise to skip redundant code paths. The
flipside of the coin is that it may allow these kind of timing
attacks.


-- 
 Mika Boström      +358-50-410-9042  \-/  "The Hell is empty,
 Bostik@lut.fi    www.lut.fi/~bostik  X    and all the devils
 Security freak, and proud of it.    /-\   are here." -W.S.
(101735) /Mika =?iso-8859-15?Q?Bostr=F6m?= <bostik@lut.fi>/(Ombruten)
Bilaga (application/pgp-signature) i text 101736
101736 2003-05-17  20:21  /8 rader/ Mika =?iso-8859-15?Q?Bostr=F6m?= <bostik@lut.fi>
Importerad: 2003-05-17  20:21  av Brevbäraren
Extern mottagare: NetExpress <netexpress@tiscali.it>
Extern mottagare: bugtraq@securityfocus.com
Externa svar till: bostik@lut.fi
Mottagare: Bugtraq (import) <4937>
Bilaga (text/plain) till text 101735
Ärende: Bilaga till: Re: bsdbsdftpd-6.0-ssl-0.6.1-1 attack allows remote users identification
------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQE+xddmi98XLjzCR9MRAs7XAJ9fz58VyXdVGww6UUtIQ2frEYKKDQCgtpp/
v1LdWZIoD2Cu/uUyesGoiR0=
=yxnt
-----END PGP SIGNATURE-----
(101736) /Mika =?iso-8859-15?Q?Bostr=F6m?= <bostik@lut.fi>/