[Date Prev][Date Next]
[Chronological]
[Thread]
[Top]
Re: (ITS#5195) ssf not available during sasl bind
Quanah Gibson-Mount wrote:
> --On Monday, October 29, 2007 10:57 PM +0000 hyc@symas.com wrote:
>> You don't. That would open you up to a downgrade attack.
> So I think the point of the ITS remains. It's difficult to do what they
> wanted to do. And really, sometimes all you care is that the connection is
> encrypted at a particular base level based on the type of encryption being
> done. Which is how it was at Stanford. Which apparently we don't support
> using the security directive. Which is why my acl's had sasl_ssf=56 all
> over them.
Your point and the original ITS are quite different. In your case, you want to
require a different SSF based on the underlying mechanism. That is foolish as
far as security policy goes; any attacker will simply ignore the stronger
defense and focus on breaking the weaker one. As the original poster stated,
security is only as strong as the weakest link.
Stay focused on the original ITS topic.
--
-- Howard Chu
Chief Architect, Symas Corp. http://www.symas.com
Director, Highland Sun http://highlandsun.com/hyc/
Chief Architect, OpenLDAP http://www.openldap.org/project/