Bug 208662 (CVE-2006-5051, CVE-2006-5052) - VUL-0: CVE-2006-5051,CVE-2006-5052: openssh: openssh 4.4 release brings more fixes
Summary: VUL-0: CVE-2006-5051,CVE-2006-5052: openssh: openssh 4.4 release brings more ...
Status: RESOLVED FIXED
: 527859 (view as bug list)
Alias: CVE-2006-5051, CVE-2006-5052
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P5 - None : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2006-09-28 06:57 UTC by Marcus Meissner
Modified: 2024-04-19 08:00 UTC (History)
5 users (show)

See Also:
Found By: Other
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Marcus Meissner 2006-09-28 06:57:09 UTC
From: Damien Miller <djm@cvs.openbsd.org>
To: vendor-sec@lst.de
Subject: [vendor-sec] Announce: OpenSSH 4.4 released
Errors-To: vendor-sec-admin@lst.de
Date: Wed, 27 Sep 2006 15:08:47 -0600 (MDT)

OpenSSH 4.4 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.

OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client and server support.

Once again, we would like to thank the OpenSSH community for their
continued support of the project, especially those who contributed
code or patches, reported bugs, tested snapshots and purchased
T-shirts or posters.

T-shirt, poster and CD sales directly support the project. Pictures
and more information can be found at:
        http://www.openbsd.org/tshirts.html and
        http://www.openbsd.org/orders.html

For international orders use http://https.openbsd.org/cgi-bin/order
and for European orders, use http://https.openbsd.org/cgi-bin/order.eu

Changes since OpenSSH 4.3:
============================

Security bugs resolved in this release:   

 * Fix a pre-authentication denial of service found by Tavis Ormandy,
   that would cause sshd(8) to spin until the login grace time
   expired.

 * Fix an unsafe signal hander reported by Mark Dowd. The signal
   handler was vulnerable to a race condition that could be exploited
   to perform a pre-authentication denial of service. On portable
   OpenSSH, this vulnerability could theoretically lead to
   pre-authentication remote code execution if GSSAPI authentication
   is enabled, but the likelihood of successful exploitation appears
   remote.

 * On portable OpenSSH, fix a GSSAPI authentication abort that could
   be used to determine the validity of usernames on some platforms.

This release includes the following new functionality and fixes:

 * Implemented conditional configuration in sshd_config(5) using the
   "Match" directive. This allows some configuration options to be
   selectively overridden if specific criteria (based on user, group,
   hostname and/or address) are met. So far a useful subset of post-
   authentication options are supported and more are expected to be
   added in future releases.

 * Add support for Diffie-Hellman group exchange key agreement with a
   final hash of SHA256.

 * Added a "ForceCommand" directive to sshd_config(5). Similar to the
   command="..." option accepted in ~/.ssh/authorized_keys, this forces
   the execution of the specified command regardless of what the user
   requested. This is very useful in conjunction with the new "Match"
   option.

 * Add a "PermitOpen" directive to sshd_config(5). This mirrors the
   permitopen="..." authorized_keys option, allowing fine-grained
   control over the port-forwardings that a user is allowed to
   establish.

 * Add optional logging of transactions to sftp-server(8).

 * ssh(1) will now record port numbers for hosts stored in
   ~/.ssh/authorized_keys when a non-standard port has been requested.

 * Add an "ExitOnForwardFailure" option to cause ssh(1) to exit (with
   a non-zero exit code) when requested port forwardings could not be
   established.

 * Extend sshd_config(5) "SubSystem" declarations to allow the
   specification of command-line arguments.

 * Replacement of all integer overflow susceptible invocations of
   malloc(3) and realloc(3) with overflow-checking equivalents.  

 * Many manpage fixes and improvements

 * New portable OpenSSH-specific features:

   - Add optional support for SELinux, controlled using the
     --with-selinux configure option (experimental)

   - Add optional support for Solaris process contracts, enabled
     using the --with-solaris-contracts configure option (experimental)
     This option will also include SMF metadata in Solaris packages 
     built using the "make package" target

   - Add optional support for OpenSSL hardware accelerators (engines),
     enabled using the --with-ssl-engine configure option.

 * Bugs from http://bugzilla.mindrot.org fixed:
    #482  - readconf doesn't accept paths with spaces in them.
    #906  - syslog messages from sshd [net] lost.
    #975  - Kerberos authentication timing can leak information
            about account validity.
    #981  - Flow stop in SSH2.
    #1102 - C program 'write' with zero length hangs.
    #1129 - sshd hangs for command-only invocations due to
            fork/child signals.
    #1131 - error "buffer_append_space:alloc not supported"
    #1138 - Passphrase asked for (but ignored) if key file permissions
            too liberal..
    #1156 - Closes connection after C-c is pressed on QNX.
    #1157 - ssh-keygen doesn't handle DOS line breaks.
    #1159 - %u and %h not handled in IdentityFile.
    #1161 - scp -r fails.
    #1162 - Inappropriate sequence of syslog messages.
    #1166 - openssh-4.3p1 has some issues compiling.
    #1171 - configure can't always figure out LLONG_MAX..
    #1173 - scp reports lost connection for very large files.
    #1177 - Incorrect sshrc file location in Makefile.in.
    #1179 - sshd incorrectly rejects  connections due to IP options. 
    #1181 - configure should detect when openssl-0.9.8x needs -ldl.
    #1186 - ssh tries multiple times to open unprotected keys.
    #1188 - keyboard-interactive should not allow retry after 
            pam_acct_mgmt fails.
    #1193 - Open ssh will not allow changing of passwords on usernames
            greater than 8 characters..
    #1201 - Bind address information is not specified in command line
            help messages.
    #1203 - configure.ac is missing an open [.
    #1207 - sshd does not clear unsuccessful login count on
            non-interactive logins.
    #1218 - GSSAPI client code permits SPNEGO usage.
    #1221 - Banner only suppressed at log level = QUIET (used to be
            at log level < INFO).

 * Fixes to memory and file descriptor leaks reported by the Coverity
   static analysis tool

 * Fixes to inconsistent pointer checks reported by the Stanford
   SATURN tool

Thanks to everyone who has contributed patches, reported bugs and
tested releases.

Checksums:
==========

- SHA1 (openssh-4.4.tar.gz) = 2294b5e5a591420aa05ff607c1890ab622ace878
- SHA1 (openssh-4.4p1.tar.gz) = 6a52b1dee1c2c9862923c0008d201d98a7fd9d6c

Reporting Bugs:
===============

- please read http://www.openssh.com/report.html
  and http://bugzilla.mindrot.org/

OpenSSH is brought to you by Markus Friedl, Niels Provos, Theo de Raadt,
Kevin Steves, Damien Miller, Darren Tucker, Jason McIntyre, Tim Rice and
Ben Lindstrom.
Comment 1 Marcus Meissner 2006-09-28 06:58:14 UTC
there are 3 security problems. 1 is tracked in the other bug, 2 are here:

From: Mark J Cox <mjc@redhat.com>
To: vendor-sec@lst.de
Subject: Re: [vendor-sec] Announce: OpenSSH 4.4 released (fwd)
Errors-To: vendor-sec-admin@lst.de
Date: Wed, 27 Sep 2006 23:36:31 +0100 (BST)

Mitre gave me:

>>  * Fix an unsafe signal hander reported by Mark Dowd.
>Use CVE-2006-5051 but please coordinate this with ISS.

>>  * On portable OpenSSH, fix a GSSAPI authentication abort that could
>>    be used to determine the validity of usernames on some platforms.
>Use CVE-2006-5052
Comment 2 Marcus Meissner 2006-09-28 12:29:35 UTC
We will merge the last update and this one.

I have submitted new patchinfos.
Comment 3 Marcus Meissner 2006-09-28 12:31:49 UTC
From: Markus Friedl <markus.r.friedl@arcor.de>
To: Josh Bressers <bressers@redhat.com>
Cc: Damien Miller <djm@cvs.openbsd.org>, vendor-sec@lst.de
Subject: Re: [vendor-sec] Announce: OpenSSH 4.4 released
User-Agent: Mutt/1.4.2i
Errors-To: vendor-sec-admin@lst.de
Date: Thu, 28 Sep 2006 11:11:15 +0200

On Wed, Sep 27, 2006 at 07:33:51PM -0400, Josh Bressers wrote:
> Hi Damien,
>
> I'm wondering if you can offer some clarification to these two issues (I'd
> gladly take some clarification from anyone on vendor-sec too).  I'm not
> familiar enough with the openssh code to easily figure these out.
>
> >
> >  * Fix an unsafe signal hander reported by Mark Dowd. The signal
> >    handler was vulnerable to a race condition that could be exploited
> >    to perform a pre-authentication denial of service. On portable
> >    OpenSSH, this vulnerability could theoretically lead to
> >    pre-authentication remote code execution if GSSAPI authentication
> >    is enabled, but the likelihood of successful exploitation appears
> >    remote.
>
> I'm wondering why this only affects GSSAPI, and beyond that, does GSSAPI
> authentication have to be enabled and working, or is having
> "GSSAPIAuthentication yes" in the configuration file enough for this to be
> triggered?

it might be possible that this codes get triggered:

#ifdef KRB5
        if (options.kerberos_ticket_cleanup &&
            authctxt->krb5_ctx)
                krb5_cleanup_proc(authctxt);
#endif
#ifdef GSSAPI
        if (compat20 && options.gss_cleanup_creds)
                ssh_gssapi_cleanup_creds();
#endif

before kerberos/gssapi contexts are setup properly.  the cleanup
code might act on undefined state.  however, we have not checked   
all details of the kerberos/gssapi libraries.

-m
Comment 4 Marcus Meissner 2006-09-28 12:32:13 UTC
From: "Ralf S. Engelschall" <rse+openpkg-security@openpkg.org>
To: Damien Miller <djm@openbsd.org>
Cc: vendor-sec@lst.de
Subject: Re: [vendor-sec] Announce: OpenSSH 4.4 released
Reply-To: rse@engelschall.com
User-Agent: Mutt/1.5.13 OpenPKG/CURRENT (2006-08-11)
Errors-To: vendor-sec-admin@lst.de
Date: Thu, 28 Sep 2006 11:54:39 +0200

On Wed, Sep 27, 2006, Damien Miller wrote:

> [...]
>  * Fix an unsafe signal hander reported by Mark Dowd. The signal
>    handler was vulnerable to a race condition that could be exploited
>    to perform a pre-authentication denial of service. On portable
>    OpenSSH, this vulnerability could theoretically lead to
>    pre-authentication remote code execution if GSSAPI authentication
>    is enabled, but the likelihood of successful exploitation appears
>    remote.
>
>  * On portable OpenSSH, fix a GSSAPI authentication abort that could
>    be used to determine the validity of usernames on some platforms.
> [...]

For the first GSSAPI related issue above I think I was able to determine
the changes from the OpenBSD CVS. But can anybody sched some light on me
what particular patch (from portable OpenSSH) fixes the second GSSAPI
related issue above? I'm having trouble to determine for OpenPKG the
right commit in the portable OpenSSH CVS...

                                       Ralf S. Engelschall
                                       rse@engelschall.com
                                       www.engelschall.com
Comment 5 Marcus Meissner 2006-09-28 15:12:22 UTC
From: "Ralf S. Engelschall" <rse+openpkg-security@openpkg.org>
To: Josh Bressers <bressers@redhat.com>
Cc: Damien Miller <djm@cvs.openbsd.org>, vendor-sec@lst.de
Subject: Re: [vendor-sec] Announce: OpenSSH 4.4 released
Reply-To: rse@engelschall.com
User-Agent: Mutt/1.5.13 OpenPKG/CURRENT (2006-08-11)
Errors-To: vendor-sec-admin@lst.de
Date: Thu, 28 Sep 2006 16:07:50 +0200

On Wed, Sep 27, 2006, Josh Bressers wrote:

> I'm wondering if you can offer some clarification to these two issues (I'd
> gladly take some clarification from anyone on vendor-sec too).  I'm not
> familiar enough with the openssh code to easily figure these out.
>
> >  * Fix an unsafe signal hander reported by Mark Dowd. The signal
> >    handler was vulnerable to a race condition that could be exploited
> >    to perform a pre-authentication denial of service. On portable
> >    OpenSSH, this vulnerability could theoretically lead to
> >    pre-authentication remote code execution if GSSAPI authentication
> >    is enabled, but the likelihood of successful exploitation appears
> >    remote.
>
> I'm wondering why this only affects GSSAPI, and beyond that, does GSSAPI
> authentication have to be enabled and working, or is having
> "GSSAPIAuthentication yes" in the configuration file enough for this to be
> triggered?

I'm currently reviewing the OpenSSH code changes for this issue and I'm
also wondering why this should be GSSAPI related at all. The code change
mainly just "makes signal handler termination path shorter" according
to both the commit information and my own review (it does an _exit()
now while before it was cleanup_exit()). And I think the signal handler
could also fire for non-GSSAPI based authentications if I understood
the code correctly. Hmmm...?

> >  * On portable OpenSSH, fix a GSSAPI authentication abort that could
> >    be used to determine the validity of usernames on some platforms.
>
> Do we know which platforms are affected by this?

Here it is the same IMHO. I'm still having trouble too exactly determine
which code change tried to fix this, but the only possible changes I've
found are not directly GSSAPI related. Instead this also looked for me
that the problem could be triggered without GSSAPI. But I do not know
the OpenSSH code well enough to be sure.

Does anybody already know more?
                                       Ralf S. Engelschall
                                       rse@engelschall.com
Comment 6 Marcus Meissner 2006-09-28 15:12:42 UTC
To: rse@engelschall.com,
        "Ralf S. Engelschall" <rse+openpkg-security@openpkg.org>
Cc: Josh Bressers <bressers@redhat.com>,
        Damien Miller <djm@cvs.openbsd.org>, vendor-sec@lst.de
From: Josh Bressers <bressers@redhat.com>
Subject: Re: [vendor-sec] Announce: OpenSSH 4.4 released
Comments: In-reply-to "Ralf S. Engelschall" <rse+openpkg-security@openpkg.org>
   message dated "Thu, 28 Sep 2006 16:07:50 +0200."
Errors-To: vendor-sec-admin@lst.de
Date: Thu, 28 Sep 2006 10:32:21 -0400

>
> I'm currently reviewing the OpenSSH code changes for this issue and I'm
> also wondering why this should be GSSAPI related at all. The code change
> mainly just "makes signal handler termination path shorter" according
> to both the commit information and my own review (it does an _exit()
> now while before it was cleanup_exit()). And I think the signal handler
> could also fire for non-GSSAPI based authentications if I understood
> the code correctly. Hmmm...?

It's probably not out of the question that there is a race in the PAM   
cleanup source too.  I've done some code analysis, and it looks like there
could be a race condition, but not so much with GSSAPI.

The call to fatal() eventually makes it way to this code:

#ifdef KRB5 
    if (options.kerberos_ticket_cleanup &&
        authctxt->krb5_ctx)
        krb5_cleanup_proc(authctxt);
#endif

#ifdef GSSAPI
    if (compat20 && options.gss_cleanup_creds)
        ssh_gssapi_cleanup_creds();
#endif

#ifdef USE_PAM
    if (options.use_pam) {
        sshpam_cleanup();
        sshpam_thread_cleanup();
    }
#endif

The call to ssh_gssapi_cleanup_creds() only results in unlink() being
called on a file.  I see no way this could be exploited as part of a race
condition to execute arbitrary code.

The call to krb5_cleanup_proc() looks suspect though.  That function calls
a number of krb5 cleanup functions, one of which will free a number of
variables.  This leads me to believe there are two possible problems.
Double free flaws, and use after free bugs.

I've not even looked at the pam cleanup bits yet.  

The advisory claims that this is simply a DoS for OpenBSD.  I believe
OpenBSD can catch a double free, but I'm not sure about the use after free
issue.  While I've found some documentation that claims it can catch them,
a quick test on an OpenBSD machine says they're not caught.

So this where I'm at right now, I'm trying to figure out what's allocating
and using the various krb5 things.

I've mailed Mark Dowd asking for more details as Damien isn't responding.
I'll pass along any details I find.

Can any of you OpenBSD guys on the list chime in on why this isn't      
exploitable?

Thanks.

--
    JB
Comment 7 Marcus Meissner 2006-09-28 15:13:01 UTC
To: vendor-sec@lst.de
Cc: rse@engelschall.com,
        "Ralf S. Engelschall" <rse+openpkg-security@openpkg.org>,
        Damien Miller <djm@cvs.openbsd.org>
From: Josh Bressers <bressers@redhat.com>
Subject: Re: [vendor-sec] Announce: OpenSSH 4.4 released
Comments: In-reply-to Josh Bressers <bressers@redhat.com>
   message dated "Thu, 28 Sep 2006 10:32:21 -0400."
Errors-To: vendor-sec-admin@lst.de
Date: Thu, 28 Sep 2006 11:07:21 -0400

>
> I've mailed Mark Dowd asking for more details as Damien isn't responding.
> I'll pass along any details I find.
>

Here's the reply I got from Mark, it looks like it's a double free issue
(which I know modern glibc catches).

    You're right, the kerberos code is more dangerous than the GSSAPI
    stuff, I think they made a bit of a mistake in that announcement.   
    Essentially, utilizing the bug with kerberos allowed you to trigger a
    large double-free() within kerberos. The PAM stuff might also be
    somewhat interesting, although it wasn't as much of a vector as I'd
    hoped for at the time I examined it.

So has anyone taken a look at the PAM bits by chance?

--
    JB
Comment 8 Petr Ostadal 2006-10-05 16:23:28 UTC
CVE-2006-5051 fixed and submited for all distros (except SLES9-SP4, I will submited tomorrow)

There isn't special fix for CVE-2006-5052.
Comment 9 Petr Ostadal 2006-10-10 16:01:27 UTC
Could I append fix for bug 210122 to this security release?
Comment 10 Thomas Biege 2006-10-13 09:51:59 UTC
From: Marco Ivaldi <raptor@0xdeadbeef.info>
To: vendor-sec@lst.de
Subject: [vendor-sec] timing leak vulnerability summary
Errors-To: vendor-sec-admin@lst.de
Date: Fri, 13 Oct 2006 10:32:01 +0200 (CEST)

Hey,

I've some news on the timing leak vulnerability i reported some days ago.

I finally reproduced it on a freshly installed SUSE box: the sshd process
has a peak in CPU usage when processing user credentials stored in
/etc/shadow, only for those usernames whose password has been changed
manually, i.e. without using yast. Take a look at the following example:

[add a new user "test" using yast]

root@testlab-suse[~]: grep test /etc/shadow
test:$2a$05$OE8sRobsfoZVO137cEiSDe1fQ8L1fSk2KiuCJ7VkAyAZzsU8F/uWu:13433:0:99999:7:-1::

[password is "test123"]

root@testlab-suse[~]: ./sshtime localhost dict

sshtime v0.1 - Simple OpenSSH remote timing attack tool
Copyright (c) 2006 Marco Ivaldi <raptor@0xdeadbeef.info>

test@localhost          real 1.23 <- no delay (it's even a bit faster;)
aaaa@localhost          real 1.27

root@testlab-suse[~]: passwd test
Changing password for test.
New Password:
Reenter New Password:
Password changed.
root@testlab-suse[~]: grep test /etc/shadow
test:$2a$10$KZFZX7yYEpbfDvwP6Z5N5ut4Gc/rdIF64/TmpWssIPQvROTiK/TiG:13433:0:99999:7:::

[password has been manually changed to "test321"]

root@testlab-suse[~]: ./sshtime localhost dict

sshtime v0.1 - Simple OpenSSH remote timing attack tool
Copyright (c) 2006 Marco Ivaldi <raptor@0xdeadbeef.info>

test@localhost          real 2.18 <- we can observe a big delay!
aaaa@localhost          real 1.27

root@testlab-suse[~]:

The cause of this behaviour is easy to spot. For instance:

"The version number, the logarithm of the number of rounds and the
concatenation of salt and hashed password are separated by the `$' character
[in /etc/shadow]. An encoded `8' would specify 256 rounds".
        -- OpenBSD crypt(3) manual page

The manually entered password has a bigger logarithm of the number of rounds
("10"), so it takes much more time to process, depending on CPU power.

This suggests the obvious workaround and means other distros/OSes that use
blowfish crypt() might be vulnerable as well... Both OpenBSD and Owl use it,
dunno about other platforms (AFAIK most of them use MD5 hashing?).

Cheers,

--
Marco Ivaldi
Antifork Research, Inc.   http://0xdeadbeef.info/
3B05 C9C5 A2DE C3D7 4233  0394 EF85 2008 DBFD B707

_______________________________________________
Vendor Security mailing list
Vendor Security@lst.de
https://www.lst.de/cgi-bin/mailman/listinfo/vendor-sec
Comment 11 Thomas Biege 2006-10-13 11:16:56 UTC
(In reply to comment #9)
> Could I append fix for bug 210122 to this security release?
> 

If the packages is not yet checked in, go ahead.

But, patchinfo files are already in /work/src/done/PATCHINFO/SWAMP-PROOFREAD-DONE/
I am not sure if changing them manually has side-effects.
Comment 12 Petr Ostadal 2006-10-13 15:59:50 UTC
added fix for bug 210122 in sles9,10.0,sles10 (others aren't affected)
Comment 13 Thomas Biege 2006-10-16 10:32:20 UTC
one more mail from vendor-sec. JFYI

From: Solar Designer <solar@openwall.com>
To: Marco Ivaldi <raptor@0xdeadbeef.info>
Cc: vendor-sec@lst.de
Subject: Re: [vendor-sec] timing leak vulnerability summary
User-Agent: Mutt/1.4.2.1i
Errors-To: vendor-sec-admin@lst.de
Date: Fri, 13 Oct 2006 17:40:23 +0400

If I understood Marco correctly, this is on its way to Bugtraq, but I'll
comment in here first anyway -

On Fri, Oct 13, 2006 at 10:32:01AM +0200, Marco Ivaldi wrote:
> This suggests the obvious workaround and means other distros/OSes that use
> blowfish crypt() might be vulnerable as well... Both OpenBSD and Owl use
> it, dunno about other platforms (AFAIK most of them use MD5 hashing?).

I'd expect that this affects all platforms that do not bother to compute
password hashes with fake salts for non-existent accounts and/or to use
the same iteration count in those fake salts that is used for real passwords.

It means that this should affect those platforms that use MD5-based
hashes, too - only to a lesser extent (since those hashes are faster).
And it should be possible to spot the "$2a$05$" (quicker to compute)
hashes on SuSE, too, compared to non-existent accounts - one just has to
do more probes per-account.

On Owl, this instance of timing leaks is resolved with:

tcb:

* Wed Apr 16 2003 Dmitry V. Levin <ldv-at-owl.openwall.com> 0.9.8.4-owl1
- In pam_tcb, implemented proper fake salt creation to avoid a timing attack.

OpenSSH:

* Fri Apr 18 2003 Solar Designer <solar-at-owl.openwall.com> 3.6.1p1-owl3
...
- Pass prefix= and count= to pam_tcb also for authentication such that it
can use this information to reduce timing leaks.

(these settings have since been moved to system-auth).

However, this is indeed non-perfect.  If an admin changes the hash type
or iteration count for newly set passwords, then there will be two kinds
of password hashes on the system and it will be possible to distinguish
them through timings.  Also, this is not the only instance of timing and
other leaks of information on whether a username is valid.

--
/sd
_______________________________________________
Vendor Security mailing list
Vendor Security@lst.de
https://www.lst.de/cgi-bin/mailman/listinfo/vendor-sec
Comment 14 Marcus Meissner 2006-10-16 11:25:30 UTC
Thorsten might be interested in the Timing Problems (comment #c10), since they are mostly PAM related. (not sure if any action is required)
Comment 15 Petr Ostadal 2006-10-16 11:34:06 UTC
But pam_tcb still doesn't solve the timing problem when we have two type of hashes in teh system ;(. Maybe we should documentate it for admin ;(.
Comment 16 Thorsten Kukuk 2006-10-16 12:19:26 UTC
About the timing issue:
Hm, if you search in bugzilla, you will see that this was reported by me already several times and our security team didn't see it as real problem, so why should it be now?

But as usual in reality it does not make any difference: You can measure the times as often as you like, since you don't know which algorithm was used in which form, it does not help you in any kind. We use blowfish only for some passwords, not all. We use different "round" arguments for the passwords. So every time you meassure is meaningless. And about fake crypts: Doing fake crypts gives me the same information as not doing them.
Comment 17 Marcus Meissner 2006-10-20 14:37:38 UTC
updates + advisory released.
Comment 18 Marcus Meissner 2009-08-04 09:03:51 UTC
*** Bug 527859 has been marked as a duplicate of this bug. ***