Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

OpenVPN with PAM authentication allows multiple passwords #100

Open
AndresPineros opened this issue Mar 6, 2018 · 2 comments
Open

OpenVPN with PAM authentication allows multiple passwords #100

AndresPineros opened this issue Mar 6, 2018 · 2 comments

Comments

@AndresPineros
Copy link

I created an OpenVPN server using this role on my Ubuntu 16.04 machine, with the following variables:

....
openvpn_port: xxxx
openvpn_proto: xxx
openvpn_dev: xxx
openvpn_server: x.x.x.x x.x.x.x
openvpn_comp_lzo: yes
openvpn_cipher: AES-XXXXX
openvpn_tls_auth : yes
openvpn_user: nobody
openvpn_group: nogroup
openvpn_client_to_client: no
openvpn_verb: 4
openvpn_use_pam: yes
openvpn_use_pam_users: "{{ pam_user_array }}"
openvpn_clients:
  - myuser
.....

Because I want both PAM and certs, I removed the client-certs-not-required that is placed in the server.conf when using pam.

The password for myuser was D1$play9!!
I found by accident that I was able to login with that user using:

  • D1$play9!!
  • D1$play99
  • D1$play9999
  • D1$play99999
  • D1$play9090
  • D1$play99!!!!!!!!!

Why is this possible? This is a very serious security issue.

@lettucehead
Copy link

Why don’t you check if it’s pw truncation by altering an earlier character in the sequence. Solaris used to have this. Cred@a dude named Jay

@sgutermann
Copy link

If you google "pam truncate" you will find an answer within the first few entries. It only uses the first 8 characters.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants