Oddbean new post about | logout
 Okta Fixes Login Bypass Flaw Tied To Lengthy Usernames

Identity management firm Okta said Friday it has patched a critical authentication bypass vulnerability that affected customers using usernames longer than 52 characters in its AD/LDAP delegated authentication service. 

The flaw, introduced on July 23 and fixed October 30, allowed attackers to authenticate using only a username if they had access to a previously cached key. The bug stemmed from Okta's use of the Bcrypt algorithm to generate cache keys from combined user credentials. The company switched to PBKDF2 to resolve the issue and urged affected customers to audit system logs.
<a href="http://twitter.com/home?status=Okta+Fixes+Login+Bypass+Flaw+Tied+To+Lengthy+Usernames%3A+https%3A%2F%2Fit.slashdot.org%2Fstory%2F24%2F11%2F02%2F0113243%2F%3Futm_source%3Dtwitter%26utm_medium%3Dtwitter" rel="nofollow"><img src="https://a.fsdn.com/sd/twitter_icon_large.png"></a>
<a href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fit.slashdot.org%2Fstory%2F24%2F11%2F02%2F0113243%2Fokta-fixes-login-bypass-flaw-tied-to-lengthy-usernames%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook" rel="nofollow"><img src="https://a.fsdn.com/sd/facebook_icon_large.png"></a>



https://it.slashdot.org/story/24/11/02/0113243/okta-fixes-login-bypass-flaw-tied-to-lengthy-usernames?utm_source=rss1.0moreanon&utm_medium=feed
 at Slashdot.

https://it.slashdot.org/story/24/11/02/0113243/okta-fixes-login-bypass-flaw-tied-to-lengthy-usernames?utm_source=rss1.0mainlinkanon&utm_medium=feed