View Issue Details

IDProjectCategoryView StatusLast Update
0005583SOGoBackend Generalpublic2023-01-24 07:37
Reporterabashurov Assigned To 
PrioritynormalSeveritymajorReproducibilityalways
Status newResolutionopen 
Product Version5.7.1 
Summary0005583: sym-aes-128-cbc userPasswordAlgorithm does not support passwords longer than 16 symbols
Description

AES-128-CBC password check limits the block size to 16 symbols: https://github.com/Alinto/sogo/blob/master/SoObjects/SOGo/NSData%2BCrypto.m#L637

AES128_CBC_encrypt_buffer, however, will emit more than 16 symbols in case input data exceeds the length of a block (16 symbols as well): https://github.com/Alinto/sogo/blob/master/SoObjects/SOGo/aes.c#L519

Steps To Reproduce
  1. Set up SQL-backed authentication as described in the documentation with the "sym-aes-128-cbc" encryption method. Excerpt from the configuration:
    SOGoUserSources = (
    {
      type = sql;
      id = plesk;
      viewURL = "mysql://sogo:sogopasswd@localhost:3306/psa/sogoMailSource";
      userPasswordAlgorithm = "sym-aes-128-cbc";
      prependPasswordScheme = NO;
      keyPath = "/etc/sogo/sw_private_key";
      canAuthenticate = YES;
      isAddressBook = NO;
    }
    );
  2. Insert the following data into the SQL server:
    CREATE TABLE sogoMailSource(`c_uid` VARCHAR(128) NOT NULL, `c_name` VARCHAR(128) NOT NULL, `c_password` VARCHAR(128), `c_cn` VARCHAR(128) NULL, `mail` VARCHAR(128) NOT NULL, PRIMARY KEY (`c_uid`));
    INSERT INTO sogoMailSource(c_uid, c_name, c_password, c_cn, mail) VALUES('test@a10-52-36-116.qa.plesk.tech', 'test@a10-52-36-116.qa.plesk.tech', '$AES-128-CBC$JTJadZKgoNNOa9yAGlPPQA==$vLPvhY2tcyNWaYtGiY26T5GFmuEg2/O5PJeIrPs4C5Q=', 'test@a10-52-36-116.qa.plesk.tech', 'test@a10-52-36-116.qa.plesk.tech');
  3. Use the following private key:
    echo 'KNsJZ4y5PTQTh0AB4As3kg==' | base64 -d > /etc/sogo/sw_private_key && chown sogo:root /etc/sogo/sw_private_key
  4. Attempt to log in as user 'test@a10-52-36-116.qa.plesk.tech' with password 'AWcxm8CyKpgjWJOPHPUoXg=='

Expected result: authentication success

Actual result: authentication failure

Additional Information

The minimal required patch for the issue is attached.

Please also note that AES128_CBC_encrypt_buffer does not restrict the length of the incoming data, therefore providing a password input longer than 256 symbols will cause buffer overflow, as provided buffer is limited: https://github.com/Alinto/sogo/blob/master/SoObjects/SOGo/NSData%2BCrypto.m#L613

Tagspassword

Activities

abashurov

abashurov

2022-08-20 01:05

reporter  

diff (2,660 bytes)   
andaga

andaga

2023-01-24 05:10

reporter   ~0016582

+1! Can you fix this please urgently?

sebastien

sebastien

2023-01-24 07:37

administrator   ~0016585

Hi, thanks for reporting. Can you please do a pull request following those guidelines : https://github.com/Alinto/sogo/blob/master/.github/CONTRIBUTING.md ?

Sebastien

Issue History

Date Modified Username Field Change
2022-08-20 01:05 abashurov New Issue
2022-08-20 01:05 abashurov Tag Attached: password
2022-08-20 01:05 abashurov File Added: diff
2023-01-24 05:10 andaga Note Added: 0016582
2023-01-24 07:37 sebastien Note Added: 0016585