Bug 23362 - Broken remembering of login-data
Summary: Broken remembering of login-data
Alias: None
Product: Bugzilla
Classification: Community
Component: Bugzilla General   
(Show other bugs)
Version: 2.8
Hardware: i386 Linux
medium vote
Target Milestone: ---
Assignee: David Lawrence
QA Contact: David Lawrence
Depends On:
TreeView+ depends on / blocked
Reported: 2001-01-04 23:46 UTC by Enrico Scholz
Modified: 2007-04-18 16:30 UTC (History)
0 users

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2001-01-05 19:55:09 UTC
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

Description Enrico Scholz 2001-01-04 23:46:37 UTC
When entering http://bugzilla.redhat.com/bugzilla/, Bugzilla knows who am I
("Login: ..." on top shows my email-address). But when I try to query or
enter a bug Bugzilla forgets who am I ("Not Logged In"). When I
authenticate me by entering my login/passwd I can do some actions (I can
not determine a rule, which actions are possible --- it seems to be
randomly), but then the "I need a legitimate e-mail address..." screens

I have a static IP and query through a proxy.

Comment 1 David Lawrence 2001-01-05 14:46:43 UTC
First, the index.cgi screen does not do any strict authorization checking and
only looks to see if there is a cookie 'Bugzilla_login' set to obtain a username
from. I should take out the who Login part since this can be misleading at

Second I know I have suggested this time and time again but could you try moving
your .netscape/cookies file out of the way and re-trying. If this solves the
problem for you then just edit your .netscape/cookies file to remove all lines
containing 'Bugzilla_login' and Bugzilla_logincookie' and move the file back in
place. Bugzilla now does authentification off of the persons IP address as well
so sometimes old cookies can cause problems. Let me know if this works.

Comment 2 Enrico Scholz 2001-01-05 17:01:26 UTC
I know the reason now:

My HTTP-proxy has changed and the new one is doing load-balancing. So the IP
where I am coming from changes and the auth-token becomes invalid.

Because that's an usual configuration I am in doubt about the applicableness of
IP-based authentification with HTTP. Perhaps you can add any IP a valid
authentication came from to a list?

If you really want to keep the old way, can you please prefill the
username-field of the login-formular with the value of the
"Bugzilla_login"-cookie? That would save some time...

Comment 3 David Lawrence 2001-01-05 19:34:56 UTC
Would authentification based on hostname using reverse host lookup work better
for this type of situation? I could enable it if so.

Comment 4 Enrico Scholz 2001-01-05 19:55:07 UTC
No, the hostnames are different also. E.g. I can come from 
howe.hrz.tu-chemnitz.de, anderson.hrz.tu-chemnitz.de or

I can modify my configuration to use only one of them for my RH visits, but
other people are probably affected also.

Comment 5 David Lawrence 2001-01-05 20:16:23 UTC
The problem is is that bugzilla keys off of the cookie number associated with
Bugzilla_logincookie and also the ip/hostname of the client. So different ip's
would have different cookie numbers also which would mean to allow multiple
hosts access with the same  cookie number would be a major change to the way
Bugzilla currently handles authentification. The Bugzilla community as well as
myself are looking into other means of authentification for future releases of

As for the part about affecting a wide range of people, I think you and maybe
one or two others have ever reported thisproblem but they just may not notice it
is happening.

Comment 6 Enrico Scholz 2001-01-05 20:39:17 UTC
The current authentication mechanism of Bugzilla is completely unsecure. It
seems `Bugzilla_logincookie' is a 16bit value only. Everybody who come from an
IP (proxy) where I have done my last login, can gain with a simple brute-force
attack my identity. 

At my (small) university some thousand people (a lot of them with the needed
knowledge about attacks) can use the proxy I am using also. Think of big
providers which are having ten- or hundredthousand users!

Again, I think that techniques which are using some kind of IP based
authentication are not working with HTTP. So Bugzilla needs a redesign.

Comment 7 Havoc Pennington 2001-01-25 19:21:22 UTC
The logincookie number is not really a 16bit number per say. It is a
continuously incrementing number to 38 bits of precision. This is only limited
by the integer data type used in the database field. When someone logs in, they
get whatever the next sequence number is from a number pool. For the number to
get saved to the Bugzilla_logincookie you also have to provide a valid password.
If not then the number is never used again anyway. Also Bugzilla now can use SSL
if people are worried about sniffing of passwords and logincookie numbers.

Comment 8 Enrico Scholz 2001-01-25 19:49:53 UTC
Ok, when I wrote my last report the number looked like 16bit and now I am seeing
it is really >2^16. But the used method is more worse then choosing a random
16bit number. E.g. the following attack would be possible:

1. I log into bugzilla in; bugzilla gives now enrico.scholz@inf... from
squire.hrz.tu-chemnitz.de (proxy by thousands of people) with authtoken X access

2. An attacker at my univerity knows that the current token-number is Y (can be
detected easily) and that I have done step #1. Now he sends the cookie-pair
[Bugzilla_login=enrico.scho..., Bugzilla_logincookie=Y-z] to bugzilla where `z'
is a small random number and `enrico.scho...' my public email-address. Bugzilla
sees that this connection comes from squire.hrz... and grants access if Y-z==X.

Because of the simple calculation of the authtoken, the last condition Y-z==X
can be true with a high propability. I don't know if bugzilla makes authtoken
invalid if a bad [email,login-cookie,ip]-tripel was provided. If not bugzilla is
highly insecure (a guess you will need only to choose `z' <20 to cover the last

As seen above the IP or hostname does not enhance the security significantly.
Better use random auth-tokens from a 2^128 range in combination with the email.

Comment 9 Trevor Cordes 2001-07-28 11:26:15 UTC
To add my 2 cents: I too have this problem.  In my situation I am behind a 
firewall that round-robins (using squid) between my ISP's 4 web proxy servers.  
My login information is always lost of only shows up every 4 hits :-(

I think this type of situation will become more common as people get behind 
firewalls and realize they can increase their web speeds by round-robining 
between multiple servers.

Bugzilla should just use username/password for authentication like most other 
sites out there, with exceptions for RH employees as their the only ones who 
really need the security of an IP check anyways.

Note You need to log in before you can comment on or make changes to this bug.