[Date Prev][Date Next]
[Chronological]
[Thread]
[Top]
Re: comments to draft-ietf-ldapbis-authmeth-04.txt
Alexey Melnikov writes:
>Hallvard B Furuseth wrote:
>>Alexey Melnikov writes:
>>> Hallvard B Furuseth wrote:
>>>
>>>> Section 3.9 "Storing passwords" says: if this password file is
>>>> compromised, then an attacker gains immediate access to documents on
>>>> the server using this realm.
>> (...)
>>
>>That is, does this mean that one can authenticate as any in the password
>>file if the password file is compromised?
>>
> Yes, the same way as if you have all passwords in the clear. However,
> 1). these hashes are not good for other servers, even if the same user
> has an account and uses the same password. They are effectively "salted"
> with realm, which will be in most cases different;
> 2). changing realm used by the compromised server, should disallow
> access to anyone.
>
> Also, I believe it is possible to store a salted version of the hash,
> assuming the server always generates
> nonce-value that uses the salt as the prefix. But of course this salted
> hash will be different from traditional UNIX salted hashes.
Thanks.
I hope to see something about this in the Security Considerations of the
Authmeth draft. Though perhaps it should wait to after -07 is out.
--
Hallvard