action=update broken

Bug #340836 reported by Brian May
12
This bug affects 2 people
Affects Status Importance Assigned to Milestone
libpam-ccreds (Ubuntu)
Confirmed
Medium
Unassigned

Bug Description

Binary package hint: libpam-ccreds

The suggested configuration, at <https://help.ubuntu.com/community/PamCcredsHowto> says to use if ldap authentication failed, e.g. bad password, use action=update which deletes the cached credentials.

This makes sense, because if the user entered an invalid password and the LDAP server is contactable, the cached credentials may be invalid[1].

However my tests reveal action=update is a NOP action.

This seems to come from the following line within cc_lib.cc

if (memcmp(data, data_stored, datalength) == 0 || !credentials) {
   ... do delete ...
}

I suspect the memcmp checks the password matches the cached value (no it doesn't, the pam configuration makes sure of this). credentials set to the string I am using to log in (I assume this is correct?). As such, the if test fails, and the deletion is skipped.

This behaviour, if somehow correct, is not documented anywhere I can see.

(note I am using the pam configuration from another bug report <https://bugs.launchpad.net/ubuntu/+source/libpam-ccreds/+bug/294977/comments/9>)

Notes

[1] of course it could also be used as a DOS attack - e.g. connect somebodies computer up to the network, type an invalid password, that user won't be able to log in any more without using the network the first time. Not sure what to do about this.

Mathias Gug (mathiaz)
Changed in libpam-ccreds (Ubuntu):
importance: Undecided → Medium
Revision history for this message
Launchpad Janitor (janitor) wrote :

Status changed to 'Confirmed' because the bug affects multiple users.

Changed in libpam-ccreds (Ubuntu):
status: New → Confirmed
Changed in libpam-ccreds (Ubuntu):
status: Confirmed → New
Changed in libpam-ccreds (Ubuntu):
status: New → Confirmed
Revision history for this message
Patrick Banholzer (patrick-banholzer) wrote :

have the same issue ... worked before on our 10.04 Systems. This bug distracts us from upgrading our clients to 12.04

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.