Bug#343085: exim4: Exim SMTP_AUTH hangs since today...

Sven Hartge sven at svenhartge.de
Mon Jan 30 16:08:05 UTC 2006


Florian Weimer wrote:
> * Sven Hartge:
>> Florian Weimer wrote:
>>> * Florian Weimer:

>>>> It's the generation of the special server-side key used to
>>>> support "RSA export" clients which use 40-bit symmetric session
>>>> keys.
>>> Turns out the patch was broken.  This one should be better.  The 
>>> comments above still apply.
>> Will this patch be included in the next point release of Sarge
> 
> Not sure about that.  There are different means to to tackle this 
> problem.  We could just remove
> 
> rm -f /var/spool/exim4/gnutls-params
> 
> from the daily cron job.  Or we add proper locking so that only one 
> Exim process actually recomputes the params file when it is missing, 
> significantly reducing the impact of this problem.  Or the preferred 
> option: do not remove that file, but regenerate it and replace it
> with the new version, so that Exim never has to regenerate it.

Isn't this what is done in the version from Sid right now?

> In any case, we need people whose Exim installations suffer from this
> problem to test a patch before we roll it out.

I am more going to test this patch as soon as possible, probably this
evening.

>> or better yet released via a security update, since it is trivial
>> to DoS Exim4 from Sarge with some single SSL/TLS connections?
> 
> AFAICS, it is not possible to trigger this bug reliably (I had to 
> delete the params file manually to prove it).

I don't have to delete the params file, as _every single_ encrypted mail
transaction totally depletes my entropy pool, thus it is impossible for
my server to receive more than 1 mail every 5 minutes without totally
stalling.

So if you wanted to DoS my server, you just had to open some SSL
connections and *whoop*, no more mail delivery or reception is possible,
since the entropy pool stays at a constant zero, if you reopen a new
connection from time to time.

With exim+openssl I am not able to reproduce this effect and I have yet
to test your patch to see if it also solves the problem.

> It certainly results in a loss of service, but it's a security
> vulnerability, and therefore does not qualify as a security bug.

You probably mean "it's not a security vulnerability" in which case I
object.

Grüße,
Sven.

-- 
Sven Hartge -- professioneller Unix-Geek
Meine Gedanken im Netz: http://www.svenhartge.de/

Achtung, neue Mail-Adresse: sven at svenhartge.de




More information about the Pkg-exim4-maintainers mailing list