Bug 1021952 - JGroups X509Token Authentication is vulnerable to replay attacks
Summary: JGroups X509Token Authentication is vulnerable to replay attacks
Keywords:
Status: CLOSED WONTFIX
Alias: None
Product: JBoss Data Grid 6
Classification: JBoss
Component: JGroups
Version: 6.2.0
Hardware: Unspecified
OS: Unspecified
unspecified
high
Target Milestone: ---
: ---
Assignee: Tristan Tarrant
QA Contact: Martin Gencur
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2013-10-22 11:49 UTC by Martin Gencur
Modified: 2014-07-23 05:59 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2014-04-29 13:11:17 UTC
Type: Bug
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Issue Tracker JGRP-1487 0 Major Resolved AUTH: X509Token Authentication is vulnerable to replay attacks 2017-05-15 14:27:04 UTC

Description Martin Gencur 2013-10-22 11:49:52 UTC
See description of the bug in linked JIRA.

Comment 2 JBoss JIRA Server 2013-10-23 07:36:40 UTC
Bela Ban <bela> made a comment on jira JGRP-1487

Tristan's looking into this now

Comment 3 Martin Gencur 2014-04-29 13:11:17 UTC
The AUTH protocol will be replaced by SASL.

Comment 4 JBoss JIRA Server 2014-07-23 05:59:27 UTC
Bela Ban <bela> updated the status of jira JGRP-1487 to Resolved


Note You need to log in before you can comment on or make changes to this bug.