<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security &#8211; privacyID3A</title>
	<atom:link href="https://www.privacyidea.org/category/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.privacyidea.org</link>
	<description>flexible, Open Source Multi Factor Authentication (2FA)</description>
	<lastBuildDate>Tue, 13 Feb 2018 07:12:23 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.privacyidea.org/wp-content/uploads/2016/06/cropped-only-logo-white-background-32x32.png</url>
	<title>Security &#8211; privacyID3A</title>
	<link>https://www.privacyidea.org</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Bug in WebUI can lead to disclosure of credentials</title>
		<link>https://www.privacyidea.org/bug-webui-can-lead-disclosure-credentials/</link>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Tue, 13 Feb 2018 07:12:23 +0000</pubDate>
				<category><![CDATA[Bug]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Whatsup]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=1331</guid>

					<description><![CDATA[A bug in the WebUI can lead to disclosure of the credentials of previously logged in users. Under certain conditions a local, physical attacker can get access to passwords of previously logged in users from the WebUI. Details Preconditions This problem occurs, if the following conditions apply: A logged in user in the WebUI locks [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>A bug in the WebUI can lead to disclosure of the credentials of previously logged in users.</p>
<p>Under certain conditions a local, physical attacker can get access to passwords of previously logged in users from the WebUI.</p>
<h2>Details</h2>
<h3>Preconditions</h3>
<p>This problem occurs, if the following conditions apply:</p>
<ol>
<li>A logged in user in the WebUI locks the WebUI or logs out and does not close the browser tab.</li>
<li>The attacker gets local access to the browser tab.</li>
</ol>
<h3>Affected versions</h3>
<p>privacyIDEA &lt; 2.21.4</p>
<h3>Technical background</h3>
<div>The Web UI writes many debug information to the console log in the browser. Also the login credentials are logged to the console and do not get deleted when the user logs out or locks the WebUI.</div>
<div>
<div>An attacker can now go to the user&#8217;s desktop and to the browser tab and open the console log. In the console log the attacker can find the sensitive information!</div>
</div>
<h3>Advisory</h3>
<div>Access to the browser tab by any third person needs to be avoided:</div>
<ul>
<li>No third person should use the user&#8217;s computer/desktop</li>
<li>The desktop should be locked, when the user leaves his desktop</li>
<li>The browser tab should be closed, when the user has finished working in the UI.</li>
</ul>
<h3>Fix</h3>
<p>This bug is fixed in the current version 2.21.4 of privacyIDEA.</p>
<div>We recommend to follow the advices for mitigation and upgrade to the current version of privacyIDEA in a timely manner.</div>
<h3>Credits</h3>
<div>This bug was discoverd in an external review by René Arends from the Hogeschool Rotterdam.</div>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Bug in passOnNoUser policy allows arbitrary authentication</title>
		<link>https://www.privacyidea.org/bug-passonnouser-policy-allows-arbitrary-authentication/</link>
					<comments>https://www.privacyidea.org/bug-passonnouser-policy-allows-arbitrary-authentication/#comments</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Wed, 04 May 2016 12:48:42 +0000</pubDate>
				<category><![CDATA[Bug]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Authentication]]></category>
		<category><![CDATA[passOnNoUser]]></category>
		<category><![CDATA[Policy]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=923</guid>

					<description><![CDATA[A bug in the passOnNoUser policy allows authentication with an arbitrary password. Affected version: up to privacyIDEA 2.11.2 Propability: Medium Security Severity: High Technical Background The passOnNoUser policy is supposed to check if an authenticating user exists. If the user exists, normal authentication is performed. If the user does not exist in the user store authentication is immediately successful. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>A bug in the passOnNoUser policy allows authentication with an arbitrary password.</p>
<ul>
<li>Affected version: up to privacyIDEA 2.11.2</li>
<li>Propability: Medium</li>
<li><strong>Security Severity: High</strong></li>
</ul>
<h2>Technical Background</h2>
<p>The passOnNoUser policy is supposed to check if an authenticating user exists. If the user exists, normal authentication is performed. If the user does not exist in the user store authentication is immediately successful. This is useful in special scenarios, where the Application has several levels of authentication and privacyIDEA is just the second level. Users that do not exist in privacyIDEA will only authenticate with the first level and users, that have an account in privacyIDEA will need to authenticate with the second level.</p>
<p>The Bug: If the policy passOnNoUser is set, it is not checked, if the user exists. <strong>I.e. even users that do exist are successfully authenticated, without checking their OTP value or password.</strong></p>
<h2>Advisory</h2>
<p>You need to disable a policy containing the passOnNoUser action or remove the passOnNoUser action from you policies immediately.</p>
<h2>Fix</h2>
<p>You should update to version 2.11.3 which is released today.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/bug-passonnouser-policy-allows-arbitrary-authentication/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>RedHat 7.2 SSSD offline functionalities</title>
		<link>https://www.privacyidea.org/redhat-7-2-sssd-offline-functionalities/</link>
					<comments>https://www.privacyidea.org/redhat-7-2-sssd-offline-functionalities/#respond</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Wed, 24 Feb 2016 15:34:26 +0000</pubDate>
				<category><![CDATA[opinions]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Authentication]]></category>
		<category><![CDATA[offline]]></category>
		<category><![CDATA[PAM]]></category>
		<category><![CDATA[sssd]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=897</guid>

					<description><![CDATA[Dmitri Pal blogged about the offline functionalities of the SSSD with RHEL 7.2. These SSSD offline functionalities is intended to increase performance to not contact the IdM server all the time. I wonder if the timeout can not only set to some seconds but also to go offline with the client. The same blog post also [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a href="http://rhelblog.redhat.com/2016/02/23/new-identity-management-features-in-rhel-7-2/" target="_blank">Dmitri Pal blogged about the offline functionalities of the SSSD with RHEL 7.2</a>.</p>
<p>These SSSD offline functionalities is intended to increase performance to not contact the IdM server all the time. I wonder if the timeout can not only set to some seconds but also to go offline with the client.</p>
<p>The same blog post also talks about OTP multistep prompting. But when going offline you do not want to decrease security by just requiring the first factor. This is why <a href="https://privacyidea.readthedocs.org/en/latest/machines/index.html#application-offline" target="_blank">privacyIDEA provides the hashed OTP values to the client to be able to authenitcate with two factors while offline</a>.</p>
<p>Admitted, going online again is a bit tricky, since the concept of resynchronizating the offline client with the authentication backend also contains possible attack vectors.</p>
<p>I am curious how SSSD will face this problem.</p>
<p>&nbsp;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/redhat-7-2-sssd-offline-functionalities/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Data Privacy Day with privacyIDEA</title>
		<link>https://www.privacyidea.org/data-privacy-day-with-privacyidea/</link>
					<comments>https://www.privacyidea.org/data-privacy-day-with-privacyidea/#respond</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Thu, 28 Jan 2016 10:49:48 +0000</pubDate>
				<category><![CDATA[opinions]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Authentication]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=863</guid>

					<description><![CDATA[Today is the Data Privacy Day. In Europe it is called Data Protection Day. Data Privacy Day This day is foremost ment to sensitize companies and users to take care when handling with private data. Especially in social media. But you can not devide your social life from your work life. Many attacks may start [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Today is the <a href="https://en.wikipedia.org/wiki/Data_Privacy_Day" target="_blank">Data Privacy Day</a>. In Europe it is called Data Protection Day.</p>
<h2>Data Privacy Day</h2>
<p>This day is foremost ment to sensitize companies and users to take care when handling with private data. Especially in social media. But you can not devide your social life from your work life. Many attacks may start in social networks and end up in the heart of the company where the original victim is employed.</p>
<p>This is why you should protect information, that can be used to initiate attacks. This can be personal information, that only you and your personal contacts know, addresses (<a href="http://www.blackmoreops.com/2016/01/27/social-engineering-amazon-customer-service/" target="_blank">Read this very interesting story</a>), dates, usernames and of course any hints to passwords.</p>
<h2>Data Privacy with privacyIDEA</h2>
<p><a href="https://www.privacyidea.org/wp-content/uploads/2016/01/door-1089560_640.jpg" rel="attachment wp-att-867"><img decoding="async" class="wp-image-867 alignleft" src="https://www.privacyidea.org/wp-content/uploads/2016/01/door-1089560_640-300x200.jpg" alt="door-1089560_640" width="206" height="137" srcset="https://www.privacyidea.org/wp-content/uploads/2016/01/door-1089560_640-300x200.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2016/01/door-1089560_640.jpg 640w" sizes="(max-width: 206px) 100vw, 206px" /></a>The job of privacyIDEA is to keep the data in your organization safe. privacyIDEA does this by introducing a second factor for authentication. Credentials for any account gained from social engineering in social networks or phishing will not get the attacker in. If you are using a hardware second factor like a <a href="https://netknights.it/produkte/yubikey/" target="_blank">Yubikey</a> or a <a href="https://netknights.it/produkte/smartdisplayer/" target="_blank">Smartdisplayer OTP card</a> the classic cracker is in a mess, since he would have to get out and perform a real life action like stealing the hardware possession.</p>
<p>When using privacyIDEA it respects your privacy. privacyIDEA is 100% Open Source and 100% Back door free. This way you can know every second what the system is doing and all your data and all your authentication decisions belong to you!</p>
<h2>Also do Encryption</h2>
<p>An additional measure to protect your data is encryption. To get help with <a href="https://netknights.it/en" target="_blank">authentication and encryption you may ask the company NetKnights</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/data-privacy-day-with-privacyidea/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Choose required Security Level with privacyIDEA</title>
		<link>https://www.privacyidea.org/choose-required-security-level-with-privacyidea/</link>
					<comments>https://www.privacyidea.org/choose-required-security-level-with-privacyidea/#respond</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Wed, 20 Jan 2016 11:22:09 +0000</pubDate>
				<category><![CDATA[opinions]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Tips and Tricks]]></category>
		<category><![CDATA[Authentication]]></category>
		<category><![CDATA[Google Authenticator]]></category>
		<category><![CDATA[security level]]></category>
		<category><![CDATA[SMS OTP]]></category>
		<category><![CDATA[Token Types]]></category>
		<category><![CDATA[Yubikey]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=852</guid>

					<description><![CDATA[With SMS OTP a one time password is sent to a mobile phone. The user is supposed to enter this one time password in addition to his static password. This way, the authenticating party thinks to verify, that the user is in the possession of the mobile phone. This is a cheap way to establish [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>With SMS OTP a one time password is sent to a mobile phone. The user is supposed to enter this one time password in addition to his static password. This way, the authenticating party thinks to verify, that the user is in the possession of the mobile phone.</p>
<p>This is a cheap way to establish two-factor authentication with something you know and something you have.</p>
<h2>Several attack vectors for Two-Factor Authentication with SMS OTP</h2>
<figure id="attachment_856" aria-describedby="caption-attachment-856" style="width: 300px" class="wp-caption alignright"><a href="https://www.privacyidea.org/wp-content/uploads/2016/01/mobile-phone-991494_640.jpg" rel="attachment wp-att-856"><img fetchpriority="high" decoding="async" class="size-medium wp-image-856" src="https://www.privacyidea.org/wp-content/uploads/2016/01/mobile-phone-991494_640-300x167.jpg" alt="Your OTP on the mobile is vulnarable." width="300" height="167" srcset="https://www.privacyidea.org/wp-content/uploads/2016/01/mobile-phone-991494_640-300x167.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2016/01/mobile-phone-991494_640.jpg 640w" sizes="(max-width: 300px) 100vw, 300px" /></a><figcaption id="caption-attachment-856" class="wp-caption-text">Your OTP on the mobile is vulnarable.</figcaption></figure>
<p>But lateley there are again some news about the vularability of OTP values sent via SMS. There are different attack vectors. In one scenario <a href="http://mobilemarketingmagazine.com/97087-2/" target="_blank">the attacker can reroute or &#8220;steal&#8221; the SIM card by doing social engineering at the telephone provider</a>. In another scenario <a href="http://www.businessinsider.de/malware-discovered-that-defeats-two-factor-authentication-symantec-2016-1" target="_blank">a malicious software is installed on the smartphone, that can sniff the OTP value</a>.</p>
<p>Yes, privacyIDEA also supports sending OTP values via SMS and privacyIDEA is also vulnarable to these attacks &#8211; since it is the basic concept that lacks the necessary security.</p>
<h2>Security is shades of grey &#8212; or white</h2>
<figure id="attachment_855" aria-describedby="caption-attachment-855" style="width: 300px" class="wp-caption alignleft"><a href="https://www.privacyidea.org/wp-content/uploads/2016/01/mixing-desk-351478_640.jpg" rel="attachment wp-att-855"><img loading="lazy" decoding="async" class="size-medium wp-image-855" src="https://www.privacyidea.org/wp-content/uploads/2016/01/mixing-desk-351478_640-300x199.jpg" alt="Security is shades of grey. Some volume between 0 and 99%." width="300" height="199" srcset="https://www.privacyidea.org/wp-content/uploads/2016/01/mixing-desk-351478_640-300x199.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2016/01/mixing-desk-351478_640.jpg 640w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a><figcaption id="caption-attachment-855" class="wp-caption-text">Security is shades of grey. Some volume between 0 and 99%.</figcaption></figure>
<p>But you might have heard that &#8220;there is no 100% security&#8221;. And that &#8220;security is a process&#8221;. And now I add to these idioms &#8220;Security is Shades of Grey&#8221;.</p>
<p>You gain security by using a password on your account to lock the desktop. But are you secure? You gain further security by adding a second factor during authentication. But is your data secure, now? You gain further security by encrypting the harddisk (a.k.a. your data) of your desktop. But is it secure?</p>
<p>Yes, it is good to use a password. You should not use none.</p>
<p>And yes, it is goot to use SMS OTP. It is better than to not use it. In certain cases it might be OK to use SMS OTP being aware of the possible risks.</p>
<p>But there are further steps or other possiblities to increase security.</p>
<h2>Choice of Security Level</h2>
<p>With privacyIDEA you have the choice, which security level you are going to use. And this may even depend on the application and the client.</p>
<p>You may use <a href="https://www.privacyidea.org/about/features/">SMS OTP, Email OTP, Smartphone Apps like the Google Authenticator, hardware key fobs and seedable tokens</a> like the <a href="https://www.privacyidea.org/privacyidea-admin-client-for-yubikey-mass-enrollment/">Yubikey</a>. Using privacyIDEA&#8217;s policy definitions, <a href="https://www.privacyidea.org/enforcing-security-policies-security-levels-with-different-otp-token-types/">you can define which token type is allowed to be used for authentication at which application</a>. This way you can accept the risk of using e.g. SMS OTP for low security applications and hardware devices like the yubikey for applications requiring higher confidentiality.</p>
<p>See the <a href="http://privacyidea.readthedocs.org/en/latest/policies/index.html" target="_blank">online documentation on policies</a> for more information or come to the <a href="https://groups.google.com/forum/#!forum/privacyidea" target="_blank">Google Group mailing list</a>.</p>
<p>If you require any <a href="https://netknights.it/en" target="_blank">professional assistance you may contact the maintainer of privacyIDEA</a>.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/choose-required-security-level-with-privacyidea/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Crypto Considerations</title>
		<link>https://www.privacyidea.org/crypto-considerations/</link>
					<comments>https://www.privacyidea.org/crypto-considerations/#respond</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Fri, 15 Jan 2016 17:00:06 +0000</pubDate>
				<category><![CDATA[documentation]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Crypto]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=846</guid>

					<description><![CDATA[Today I added the crypto considerations to the FAQ section of the privacyIDEA documentation. Users who might want to use privacyIDEA will wonder how crypto is handled. So this makes it easier for them to get a first impression without having to study the source code. In fact this is also a good review for the project [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a href="https://www.privacyidea.org/wp-content/uploads/2016/01/cryptography-1091254_640.jpg" rel="attachment wp-att-848"><img loading="lazy" decoding="async" class="size-medium wp-image-848 alignleft" src="https://www.privacyidea.org/wp-content/uploads/2016/01/cryptography-1091254_640-300x212.jpg" alt="cryptography-1091254_640" width="300" height="212" srcset="https://www.privacyidea.org/wp-content/uploads/2016/01/cryptography-1091254_640-300x212.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2016/01/cryptography-1091254_640.jpg 640w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a>Today I added the <a href="http://privacyidea.readthedocs.org/en/latest/faq/crypto-considerations.html" target="_blank">crypto considerations to the FAQ section of the privacyIDEA documentation</a>.</p>
<p>Users who might want to use privacyIDEA will wonder how crypto is handled. So this makes it easier for them to get a first impression without having to study the source code.</p>
<p>In fact this is also a good review for the project itself, too. At several places we still use hard coded SHA256. With the hashing of the OTP Pins and the signing of the Audit data.</p>
<p>But having this crypto paper at hand, we know, which places we need to touch in only a few years!</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/crypto-considerations/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Bug in LDAP Resolver up to privacyIDEA 2.5</title>
		<link>https://www.privacyidea.org/bug-in-ldap-resolver-up-to-privacyidea-2-5/</link>
					<comments>https://www.privacyidea.org/bug-in-ldap-resolver-up-to-privacyidea-2-5/#respond</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Mon, 07 Sep 2015 12:24:30 +0000</pubDate>
				<category><![CDATA[Bug]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Whatsup]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=731</guid>

					<description><![CDATA[A bug in the LDAP Resolver can lead to unauthorized access as an LDAP user. Under certain conditions a rogue user can login as an LDAP user to the privacyIDEA web UI or guess a static password part during authentication when the policy scope=authentication, otppin=userstore is used. Details Preconditions This problem only occurs, when both conditions [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>A bug in the LDAP Resolver can lead to unauthorized access as an LDAP user.</p>
<p>Under certain conditions a rogue user can login as an LDAP user to the privacyIDEA web UI or guess a static password part during authentication when the policy <em>scope=authentication</em>, <em>otppin=userstore</em> is used.</p>
<h2>Details</h2>
<h3>Preconditions</h3>
<p>This problem only occurs, when both conditions are met:</p>
<ol>
<li>The LDAP resolver defines a wrong, not existing UID-Type.</li>
<li>The LDAP server is configured to allow anonymous binds.</li>
</ol>
<h3>Technical background</h3>
<p>During the password verification process, the LDAP resolver tries to find the user with the given UID &#8211; defined by the UID type. It then uses the user objects DN to bind to the LDAP server.</p>
<p>If the UID type does not exist, the LDAP resolver will get an empty DN to bind to the LDAP server. Binding with an empty DN is equal to an anonymous bind. If your LDAP server accepts anonymous binds, the bind will be successfull and the password verification is regarded as successful.</p>
<h3>Advisory</h3>
<p>If you have an LDAP server, that allows anonymous binds, you should check your LDAP resolver. Please check, that the UID Type you specified, really exist.</p>
<p>Verify authenticating to the Web UI with an existing LDAP user, but with an invalid password.</p>
<h3>Fix</h3>
<p>This bug is fixed in <a href="https://github.com/privacyidea/privacyidea/commit/1c6219e3b5d7ba6c8d4d3895ea44e4912d4b3bdd" target="_blank">this commit</a> and will be release with version 2.6 shortly.</p>
<p>&nbsp;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/bug-in-ldap-resolver-up-to-privacyidea-2-5/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
