[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1013361: Fwd: ruptime_1.4-1_amd64.changes REJECTED




From: Thorsten Alteholz <ftpmaster@ftp-master.debian.org>
Date: March 22, 2024 at 20:00:15 GMT+1
To: Gürkan Myczko <tar@debian.org>
Subject: ruptime_1.4-1_amd64.changes REJECTED


Hi,

after a short glimpse even I already found some issues with this software:

 If you install ruptime.key as described in README.md, you will get a world readable key file.
 As this is a symmetric key, everyone who has access to the key on one machine can forge messages on every other machine.
 I would not say that this can be called "encrypted messages" at all.

 It uses mcrypt in version 2.6.8 which is from 2009. It uses CBC as default encryption algorithm.
 Nowadays this is no longer recommended to use.

 Doing something like
   echo "/*/*/*/*/*/* asd" |nc localhost 51300
 for each core of your ruptimed server makes it really busy.
 There is no check, no ACL, nothing to prevent this.

This software might be nice, but there is still some work to do.

  Thorsten



===

Please feel free to respond to this email if you don't understand why
your files were rejected, or if you upload new files which address our
concerns.

Attachment: mime-attachment
Description: Binary data


Reply to: