Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    About attacks on the voucher system

    Scheduled Pinned Locked Moved Captive Portal
    2 Posts 2 Posters 1.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • 0 Offline
      0tt0
      last edited by

      pfSense is mentioned as an example of "odd RSA implementation" that provides questionable security, in a paper at iacr.

      References:
      http://eprint.iacr.org/2012/588
      http://doc.pfsense.org/index.php/Captive_Portal_Vouchers

      "In particular users of the pfSense voucher system are urgently recommended to choose the
      magic number employed in generating and verifying the voucher codes (see [4]) at random,
      keep it secret and change it regularly in order to prevent the known-plaintext attack described
      above."

      CU

      1 Reply Last reply Reply Quote 0
      • E Offline
        eri--
        last edited by

        In 2.0.2 and newer versions that are going to be release the problem has mitigated presented on that paper.

        1 Reply Last reply Reply Quote 0
        • First post
          Last post
        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.