[Date Prev][Date Next]
[Chronological]
[Thread]
[Top]
Re: Authentication Methods for LDAP - last call
I think that this is a good approach. It should allow
hooks to use other forms of "appropriately secure"
authentication (e.g., the X.509/SASL spec I am working on,
and probably some other SASL mechanisms too)
Steve
On Sat, 01 Aug 1998 11:31:34 -0700 "John C. Strassner"
<johns@cisco.com> wrote:
> How about this:
>
> In Section 6, Required Security Mechanisms, point 2:
>
> Replace:
>
> (2) Implementations providing password-based authenticated access
> MUST support authentication using CRAM-MD5, as described in
> section 8.1. This provides client authentication with
> protection against passive eavesdropping attacks, but does
> not provide protection against active intermediary attacks.
>
> with:
>
> (2) Implementations providing secure authenticated access MUST
> NOT use the "simple" password authentication choice, since
> this sends text in the clear. Therefore, such implementations
> MUST support some secure form of authentication. Two such
> examples are CRAM-MD5 and certificates. CRAM-MD5, while being
> a good choice for password-based systems, has scaling issues.
> Thus, in a large-scale distributed system, a better alternative
> would be to use certificates in conjunction with TLS. Note that
> CRAM-MD5, as described in section 8.1, provides client
> authentication with protection against passive eavesdropping
> attacks, but does not provide protection against active
> intermediary attacks. The certificate exchange system is
> described in section 9.
>
> regards,
> John
>
> At 10:31 AM 8/1/98 -0700, Tim Howes wrote:
> >The whole reason for this document is to make one mechanism
> >mandatory, so that implementations have some guarantee of
> >interoperability. Aside from being a good idea, this constraint
> >has been clearly imposed by the IESG. So, you could argue
> >that we've chosen the wrong mandatory mechanism, and that
> >we should have chosen an X.509-based mechanism to be
> >mandatory. That was considered and rejected as too high
> >an implementation burden. Given this background, and these
> >constraints, do you have any suggestions on how to improve
> >this document? -- Tim
> >
> >Steve Kille wrote:
> >
> >> Mark,
> >>
> >> I agree with all of this. CRAM-MD5 is a good shared
> >> secret mechanism, better than plain text password, and
> >> suitable for some LDAP deployment.
> >>
> >> I think that X.509 (assymetric key) mechanisms, such as
> >> the one you describe are going to be suitable for a lot of
> >> other environments.
> >>
> >> My objection is to making CRAM-MD5 MANDATORY, when it is
> >> so clearly unsuitable for a lot of types of LDAP deployment.
> >>
> >> Steve
> >
> >
> >
> >
> >
>