Debian Bug report logs - #433305
libsasl2-modules-otp: Performing SASL negotiation: invalid parameter supplied

version graph

Package: libsasl2-modules-otp; Maintainer for libsasl2-modules-otp is Debian Cyrus Team <[email protected]>; Source for libsasl2-modules-otp is src:cyrus-sasl2 (PTS, buildd, popcon).

Reported by: Hadmut Danisch <[email protected]>

Date: Mon, 16 Jul 2007 08:33:02 UTC

Severity: wishlist

Tags: confirmed, upstream, wontfix

Found in version cyrus-sasl2/2.1.22.dfsg1-13

Reply or subscribe to this bug.

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to [email protected], Debian Cyrus SASL Team <[email protected]>:
Bug#433305; Package libsasl2-modules-otp. (full text, mbox, link).


Acknowledgement sent to Hadmut Danisch <[email protected]>:
New Bug report received and forwarded. Copy sent to Debian Cyrus SASL Team <[email protected]>. (full text, mbox, link).


Message #5 received at [email protected] (full text, mbox, reply):

From: Hadmut Danisch <[email protected]>
To: Debian Bug Tracking System <[email protected]>
Subject: libsasl2-modules-otp: Performing SASL negotiation: invalid parameter supplied
Date: Mon, 16 Jul 2007 10:23:53 +0200
Package: libsasl2-modules-otp
Version: 2.1.22.dfsg1-13
Severity: normal

Hi,

I was just playing a little bit with the sasl-sample-server and
sasl-sample-client programs that come with the
debian packages for sasl2.  Running both programs in separate xterm
windows and 'sending' their messages vice versa with mouse cut and paste
works as expected, e.g. for DIGEST-MD5. The sasl-sample-client then asks
for a password.

But when I choose OTP (which is offered by the server), then the client
aborts, and I currently don't see why:


% sasl-sample-client -m OTP
Waiting for mechanism list from server...
S: QU5PTllNT1VTIE9UUCBDUkFNLU1ENSBESUdFU1QtTUQ1IExPR0lOIFBMQUlOIE5UTE0=
recieved 50 byte message
Forcing use of mechanism OTP
Choosing best mechanism from: OTP
Using mechanism OTP
Preparing initial.
Sending initial response...
C: T1RQAGhhZG11dABoYWRtdXQ=
Waiting for server reply...
S: b3RwLW1kNSA0OTggYW42OTQzIGV4dA==
recieved 22 byte message
sasl-sample-client: Performing SASL negotiation: invalid parameter supplied



You should be able to run this just example with the client side.

So the message
S: b3RwLW1kNSA0OTggYW42OTQzIGV4dA==
causes a problem. Decoding it looks like this:

% decode64 b3RwLW1kNSA0OTggYW42OTQzIGV4dA== |xxd
0000000: 6f74 702d 6d64 3520 3439 3820 616e 3639  otp-md5 498 an69
0000010: 3433 2065 7874                           43 ext

which is

otp-md5 498 an6943 ext

498 and the seed an6943 are correct. But what's wrong with this string
and why does the client abort?



regards


-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 2.6.21-2-k7 (SMP w/2 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages libsasl2-modules-otp depends on:
ii  libc6                    2.6-2           GNU C Library: Shared libraries
ii  libsasl2-modules         2.1.22.dfsg1-13 Pluggable Authentication Modules f
ii  libssl0.9.8              0.9.8e-5        SSL shared libraries

libsasl2-modules-otp recommends no packages.

-- no debconf information



Information forwarded to [email protected], Debian Cyrus SASL Team <[email protected]>:
Bug#433305; Package libsasl2-modules-otp. (full text, mbox, link).


Acknowledgement sent to Fabian Fagerholm <[email protected]>:
Extra info received and forwarded to list. Copy sent to Debian Cyrus SASL Team <[email protected]>. (full text, mbox, link).


Message #10 received at [email protected] (full text, mbox, reply):

From: Fabian Fagerholm <[email protected]>
To: [email protected]
Cc: control <[email protected]>
Subject: libsasl2-modules-otp: Performing SASL negotiation: invalid parameter supplied
Date: Sat, 12 Apr 2008 13:02:37 +0300
[Message part 1 (text/plain, inline)]
tags 433305 confirmed
thanks

Ok, I have now confirmed that this indeed happens.

Furthermore, the failure originates from lib/client.c line 639. Strange.
That line returns SASL_BADPARAM if the conn parameter evaluates to false
-- meaning that the sasl_conn_t pointer conn doesn't point to a valid
memory address. But some brief testing indicates that the conn pointer
is valid when sasl-sample-client calls sasl_client_step()...

For some reason, my gdb is broken and it can't handle
sasl-sample-client, so further debugging will have to wait until I can
get gdb to work or think of something else to try.

In the meantime, anyone can of course work on this. I wrote some bits on
http://wiki.debian.org/PkgCyrusSASL to describe how to set up OTP with
OPIE, which is what I tested with.

Cheers,
-- 
Fabian Fagerholm <[email protected]>
[signature.asc (application/pgp-signature, inline)]

Tags added: confirmed Request was from Fabian Fagerholm <[email protected]> to [email protected]. (Sat, 12 Apr 2008 10:06:08 GMT) (full text, mbox, link).


Information forwarded to [email protected], Debian Cyrus SASL Team <[email protected]>:
Bug#433305; Package libsasl2-modules-otp. (full text, mbox, link).


Acknowledgement sent to Fabian Fagerholm <[email protected]>:
Extra info received and forwarded to list. Copy sent to Debian Cyrus SASL Team <[email protected]>. (full text, mbox, link).


Message #17 received at [email protected] (full text, mbox, reply):

From: Fabian Fagerholm <[email protected]>
To: [email protected]
Subject: libsasl2-modules-otp: Performing SASL negotiation: invalid parameter supplied
Date: Sun, 13 Apr 2008 12:33:04 +0300
[Message part 1 (text/plain, inline)]
After some more digging, it seems that the cause of this has to do with
prompting the user for the response to the server challenge, and the
error is not where I said it was in the last bug log entry.

It seems that sasl-sample-client is not written to support this kind of
prompting at all. I haven't looked too deeply, but that seems to be the
case.

-- 
Fabian Fagerholm <[email protected]>
[signature.asc (application/pgp-signature, inline)]

Added blocking bug(s) of 433305: 516543 Request was from Roberto C. Sanchez <[email protected]> to [email protected]. (Mon, 14 Mar 2011 01:18:03 GMT) (full text, mbox, link).


Added tag(s) upstream. Request was from Roberto C. Sanchez <[email protected]> to [email protected]. (Tue, 15 Mar 2011 02:18:10 GMT) (full text, mbox, link).


Information forwarded to [email protected], Debian Cyrus Team <[email protected]>:
Bug#433305; Package libsasl2-modules-otp. (Mon, 18 Apr 2022 18:33:03 GMT) (full text, mbox, link).


Acknowledgement sent to Bastian Germann <[email protected]>:
Extra info received and forwarded to list. Copy sent to Debian Cyrus Team <[email protected]>. (Mon, 18 Apr 2022 18:33:03 GMT) (full text, mbox, link).


Message #26 received at [email protected] (full text, mbox, reply):

From: Bastian Germann <[email protected]>
To: [email protected]
Subject: Re: libsasl2-modules-otp: Performing SASL negotiation: invalid parameter supplied
Date: Mon, 18 Apr 2022 20:28:21 +0200
Control: severity -1 wishlist
Control: tags -1 wontfix

On Sun, 13 Apr 2008 12:33:04 +0300 Fabian Fagerholm <[email protected]> wrote:
> It seems that sasl-sample-client is not written to support this kind of
> prompting at all. I haven't looked too deeply, but that seems to be the
> case.

Right. These are just simple test programs to get an idea on how to implement each side of the protocol.



Severity set to 'wishlist' from 'normal' Request was from Bastian Germann <[email protected]> to [email protected]. (Mon, 18 Apr 2022 18:33:03 GMT) (full text, mbox, link).


Added tag(s) wontfix. Request was from Bastian Germann <[email protected]> to [email protected]. (Mon, 18 Apr 2022 18:33:03 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <[email protected]>. Last modified: Tue May 13 14:56:43 2025; Machine Name: bembo

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU General Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.