Modifications to resolve issues found during self-code review.
This commit is contained in:
@@ -87,6 +87,18 @@ CASA Authentication Tokens when compromised can be used to either impersonate
|
||||
a user or to obtain identity information about the user. Because of this it is
|
||||
important that the tokens be secured by applications making use of them. It is
|
||||
recommended that the tokens be transmitted using SSL.
|
||||
|
||||
Under Linux, the Validate CASA Authentication Token libraries validate tokens
|
||||
by invoking a service (casa_atvd, also knon as CasaAuthtokenValidateD). The security of the
|
||||
communications that happen between the library and the service is dependent on the properties
|
||||
of the stack providing Unix Domain Sockets communications and the file system rights setup
|
||||
on the folder where the domain sockets are created.
|
||||
|
||||
The SuSE rpm package for this component only allows processes executing as casaatvd
|
||||
to setup a listener on the /var/lib/CASA/authtoken/validate/ folder but it allows any
|
||||
process to connect to it. This setup may allow a rogue process to easily launch a
|
||||
denial of service attack on casa_atvd. If this is not acceptable then change the
|
||||
rigths on the folder to only allow selected users to connect to it.
|
||||
|
||||
|
||||
|
||||
|
||||
Reference in New Issue
Block a user