[Date Prev][Date Next]
[Chronological]
[Thread]
[Top]
RE: Authentication Methods for LDAP - my vote for CRAM-MD5
> -----Original Message-----
> From: George Powers [mailto:george@packeteer.com]
> Sent: Wednesday, August 05, 1998 6:43 AM
> To: ietf-ldapext@netscape.com
> Subject: Authentication Methods for LDAP - my vote for CRAM-MD5
>
>
> I've read the arguments that question the security of
> CRAM-MD5, but these
> arguments only demonstrate that a sophisticated attacker can
> break CRAM-MD5
> in certain circumstances. A system using CRAM-MD5 is still
> much, much more
> secure than one using clear-text passwords. Is there another, equally
> simple scheme that is open (no licensing required) and more secure?
HTTP Digest.
I have spent a year being beaten up about how trivial it is to break our
proprietary NTLM authentication scheme, which is almost completely
isomorphic to CRAM-MD5. There are web sites available that will tell you
your password in less than a second if you use NTLM to authenticate to them.
So, the attacks are not theoretical or require lots of sophistication.
I cannot in good conscience support CRAM-MD5. If you want to make it
optional, fine, but not mandatory to implement -- it's a waste of time.
1. CRAM-MD5 has no client input into the challenge
2. CRAM-MD5 has no salt for the password
3. CRAM-MD5 has no way to generate session keys for integrity or encryption
4. CRAM-MD5 has no way to use third party authentication server
Paul