lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <001001c577b4$0b4fe090$140b0a0a@infosec.ru> Date: Thu Jun 23 06:40:38 2005 From: offtopic at mail.ru (offtopic) Subject: Windows IPSec Vulnerabilty - still exist Hi list. I found what mitm vulnerability in Microsoft's IPSec (http://lists.seifried.org/pipermail/security/2004-May/003394.html) still exists. IPSec client don't verify subject field in certificate and accept certificates with OID 1.3.6.1.5.5.7.3.2 (TLS Web client authentication). Certificates with OID 1.3.6.1.5.5.7.3.2 (User Template) can be issued to any AD user by Enterprise CA by default. -------------- next part -------------- An HTML attachment was scrubbed... URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20050623/c4915715/attachment.html