lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Tue, 3 Aug 2010 22:09:33 +0000
From: Harry Strongburg <harry.fd@...ry.lu>
To: full-disclosure@...ts.grok.org.uk
Subject: GMail complete anonymity possible via IPv6

If a user connects to an account using gmail.com in IPv6, the "last account activity" feature will say "Unknown" as the IP address.

Screenshot example:
imgur: http://i.imgur.com/l4lFp.png
Local mirror: http://harry.lu/files/secret/gmailipv6.png
All "Unknown" entries in the screenshot are IPv6 connections, using a gmail username no one else knows of (just a garbage account I made to test this out), with a secure password (hence I am positive that there were no connections made other than mine). Erased entries in the screenshot are IPv4 addresses that I manually censored.

2001:4860:b009::53 is the current IPv6 address for gmail.com. It's an AAAA record on the domain, but I am posting it here if Google goes the easy route and just deletes the DNS entry.

This should be a major security concern for Google and all Google/GMail users. With this bug, any user can connect to GMail using IPv6, access your account, and you will not be sure if it was an accidental IPv6 connection you did, or if someone had access to your account. If you casually use IPv6, you will be unable to tell if one of the "Unknown" connections were from your IPv6 range, or a remote intruder's.

Stay classy, Google.

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ