Quote:>licensed to US Robotics anymore). They are quite popular with many ISPs and
>I haven't heard about any security problems relating to ComOS or their
>implementation of Radius ever.
You're not listening closely enough.
The RADIUS server, as distributed by Livingston, has serious
bounds-checking problems. The server runs with root creds, meaning that as
soon as someone releases a slick DNS-overflow exploit for Linux or
FreeBSD, it'll be modified within a day to a "get root quick through
radiusd" exploit.
On top of that, the "shared secrets" between the terminal servers and the
authentication server are stored in cleartext.
Finally, within the last quarter, there was a row about a ComOS
denial-of-service problem which allowed arbitrary people to crash their
Portmaster products.
-----------------------------------------------------------------------------
Tom Ptacek at The rdist Organization / exit(main(kfp->kargc, argv, environ));
"If you're so special, why aren't you dead?"