This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Passwords in Debug Logfiles - necessary or no go for a firewall device.

Hello Everybody,

recently we had a difficult to track and not reproducable problem and rarely occuring problem with our OpenVPN dial in connections (still open after several weeks). The sophos support switched on the DebugLogging without mentioning to us that this will log passwords for the user and admin webinterface, vpn dial in an, connections to backend systems (Active Directory LDAP).

After waiting some weeks to get the issue resolved I looked into this myself and noticed that that all passwords are exposed in the logfiles. This was not only all AD SSO user passwords but also high level administrative passwords that were granted permissions via Active Directory group membership to administrate the firewall devices. Although the administrations interface was strictly limited by ip (nobody can log in with this credential from a normal internet address) the security breach here is the exposed administrative password in the logfiles.

Operating Systems like Windows and Unix take big care not to expose their passwords in clear text and this can not be easily cracked - even by their administrators. Putting passwords in clear text in a logfile in a procedure that can easily be switched on by every administrator of the device is a MAJOR SECURITY ISSUE in my opinion. Think of a criminal administrator in a big company who switches this on an inpersonate the users and other administrators to do some illegal stuff in their names.

This should be switched off permanently ASAP in all production devices or at least all passwords need to be masqueraded.

How do you think about this?



This thread was automatically locked due to age.
Parents Reply Children
  • Hi Sachingurung,

    the case IDs are [#7441831] [#7528461]. The case is in German. They told me now to upgrade to 9.503 because they think it might be related to NUTM-6532 und NUTM-7167. Are you the same opinion? I plan to do the update next week and leave one of the nodes with the old firmware 9.413-04.

    The last person who worked on this was

    Timo Möhrle
    Sophos Technischer Support

    who had some development guy in the background.

    However this ticket was basically about printing passwords in the logfile in cleartext. In the opinon of me (and my colleagues) this is a major security breach as this could expose passwords in backend systems by every firewall administrator. Maybe you can ask your development to get this changed.

    Actually I am considering to send this to Heise Security (the blog of the most popular German computer magazine) or cve.mitre.org.

    Best regards,

    Bernd

  • Contacting the Mitre CVE database sounds like the better idea, as it has more likelihood of requiring an engineering response rather than a marketing one.  

  • Hi Bernd,

    I am escalating the case and will personally monitor it now onwards. On updating the firmware, I am on the same track as the information comes from the GES Team; who works along with the Development. Certainly, the case is looked upon and I assure you my supervision. Reporting Heise will be a hasty step, before getting to the root of this issue. Could you please allow us some time, we will be resilient to update you.

    Thank You,