Security vulnerability brought by non-check inventory service

From OpenSimulator

(Difference between revisions)
Jump to: navigation, search
m (Solution)
(Implementation)
Line 41: Line 41:
  
 
== Implementation ==
 
== Implementation ==
 +
 +
A patch is under preparing

Revision as of 23:47, 22 July 2008

User:Lulurun

Contents

Agenda

To enable user avatar travel from a grid service to another grid service, There are 3 problems to be considered:

  1. How to enable foreign user login - Authentication
  2. (If a foreign user can login)How to get a foreign user's belongings(including appearance, inventory)
  3. Security
    • This is discussed in this page

To achieve the 1st, client side changes are needed. SO, so far, I have only implemented the 2nd and the 3rd, and would like to explan my idea:

Problem

With the following conditions, one can simply take over the full control(CRUD) of other user's inventory.

  1. InventoryServer is exposed to the public.
  2. user's UUID is given

Simply describe in the following figure:

  • InventoryServer is a normal http server, the normal way to use it is:
    • user get the authentication from UserServer
    • user control its inventory through RegionServer
  • But since the InventoryServer accepts any request without check if the user is authenticated, or, even it does not check if the request is from a RegionServer.
  • So, if you know other users' UUID, you can send CRUD http requests directly to the InventoryServer without login.

Secure inventory 1.PNG

And AvatarPortability needs a public inventory server, so we have to make a secure one.

Solution

  • every inventory operation packet contains a "session_id" field, but it is never used.
  • so, a secure inventory service could be like this

Secure inventory 2.PNG

  • "session_id" is a important information, that is(should be) only transfered in a login session.
    • "expect_user" transfer "session_id" from UserServer to RegionServer only when the authentication is OK, so "expect_user" is safe.
    • method, such like "get_agent_by_uuid" is very dangerous.

Implementation

A patch is under preparing

Personal tools
General
About This Wiki