Bugreport Openbsc Authentification

This is merely a historical archive of years 2008-2021, before the migration to mailman3.

A maintained and still updated list archive can be found at https://lists.osmocom.org/hyperkitty/list/OpenBSC@lists.osmocom.org/.

Robert Ingr ir at mytum.de
Tue May 8 09:53:27 UTC 2012


Sylvain Munaut <246tnt at gmail.com> wrote:


> Hi,
> 
> 
> > > There is indeed a bug. But it's only in the "exception" processing, so
> > > in a normal case that shouldn't have prevented auth. (and since we use
> > > auth at the camp and 27c3, I can guarantee it works in the normal case
> > > :)
> > > 
> > > 
> > 
> > I'm sorry, i don't see why this is only an exceptional case, but ok.
> > 
> > 
> 
> Here's the faulty code :
> 
> if (ainfo->a3a8_ki_len > sizeof(ainfo->a3a8_ki))
>   ainfo->a3a8_ki_len = sizeof(ainfo->a3a8_ki_len);
> 
> So it's only executed if the current value is too big, which shouldn't
> happen if the DB field content is correct. This might be related to
> manually fiddling with the binary value without using the DBI escape
> method.
> 
> Cheers,
> 
>     Sylvain
> 
> 
> 
> 




More information about the OpenBSC mailing list