[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: issue: draft-ietf-radext-digest-auth-06.txt Digest MD5-sess



On Thu, 5 Jan 2006, Avi Lior wrote:

So one example is in Mobile IP.  Once the HA has validated the
Registration Request or Binding Update with RADIUS.  It can continue to
authentication subsequent bind request or Registration Request received
from that user. This is only limited by a lifetime received from the AAA
server.

Which is very similar to what is provided by Digest MD5-sess. The credentials given to the RADIUS client is only good for validating within a good credibility that next messages is in the same user session. It can not be reused in authentication to any other service, or even to start a new session or renew the existing session to the same service.

Giving avay the non-session Digest MD5 HA1 is a completely different think. It's in the Digest world almost equivalent to giving away the users plaintext password.

The only security issue with the MD5-sess HA1 in session mode that I can see is it SHOULD be transmitted securely IF MD5-sess is used in session mode or if message integrity protection is used as knowledge of the MD5-sess HA1 hash allows for limited session theft, limited by session nonce count and time limits enforced by the service. But as soon as the server-side nonce expires the hash is completely useless for any meaningful purposes.



My notes on security issues of the Digest-HA1 attribute in general and it's use in Digest session authentication in particular:


MD5, any mode of operation:

Equivalent to plaintext for any service using Digest authentication. Knowledge of the MD5 HA1 allow for full theft of the account on the service/realm until the password or realm is changed, and consequently also full control of integrity protection of both requests and responses.

MD5-sess, one request per nonce:

No session theft is possible as the sessions only last for a single message.

But knowing the HA1 allows breaking any response integrity protection. Request integrity is protected however as the HA1 is only known after the request has been received and processed by the service.

MD5-sess, session based:

In addition to the above it allows for session theft for as long as that session is considered valid by the service, including request/response integrity protection (except for the first message). Session length is usually limited by both nonce count (number of requests) and time. The RADIUS server may hint both session limits to the client, but can not enforce it.


Senario 1 mode of operation:

If Senario 1 mode of operation is allowed then it mau be considerably easier for an attacker to gain access to the HA1. If Scenario 1 mode of operation is allowed then he only needs to be able to see the application protocol traffic and have access to any RADIUS client allowed to query the RADIUS server in this mode to gain access to the Digest-HA1 by replaying the seen Digest message details to the RADIUS server. Transport protection of the Digest-HA1 attribute does not help against this.



Regards
Henrik

--
to unsubscribe send a message to radiusext-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://psg.com/lists/radiusext/>