25th Feb 2002 [SBWID-5123]
COMMAND
Groupwise 6 LDAP user authentification bypass
SYSTEMS AFFECTED
Groupwise 6
PROBLEM
Frank Bulk posted :
When in the following configuration : GroupWise 6 Post Office using
LDAP authentication AND security configuration of PostOffice leaves
LDAP User Name and Password fields blank in the Post Office Agent
object in ConsoleOne.
Exploit :
========
Run GroupWise as any user (either \"grpwise /@u-?\") OR if you are not
NDS authenticated, whatever the registry has stored as the last person
who logged into GroupWise) and leave the password blank. Hit enter a
couple of times and you will get right into the account.
Note :
======
This isn\'t technically a bug, but a configuration issue. In accordance
with the LDAP v3 RFC 2251, an LDAP bind in which a username is provided
but a password is not [ie. blank] is treated as an anonymous bind. This
means that a bind is granted to users providing a username but no
password. The bind granted is an anonymous bind but, based on
limitations in the LDAP spec, most LDAP implementations do not provide
any indication that the bind is in fact anonymous. GroupWise relies on
the success or failure of a bind to determine whether a users username
and password is authentic when LDAP authentication is being used [if
you put LDAP trace on you will see that blank password become anonymous
binds]. The problem is in the RFC, not GroupWise. Once we realized that
RFC had the hole, we made a change in the POA.
SOLUTION
Patch : see TID 10067921, fix FGW62N4.EXE
Workaround :
Without implementing the new code, the issue can be resolved as
follows: Fill in the LDAP User Name and Password fields in the Post
Office Agent object in ConsoleOne. The LDAP User Name is the eDirectory
account that the POA, the Internet Agent, and the WebAccess Agent can
use to log in to the LDAP server in order to authenticate GroupWise
users.
Pro: this approach to LDAP authentication is faster and requires fewer
connections to the LDAP server than if each GroupWise user
authenticates to the LDAP server individually.
Con: From within GroupWise, users will not be able to use grace logins,
nor will they be able to change their LDAP passwords.
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH