[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: RE: Password-based user authentication with Netconf over TLS
badra@isima.fr writes:
>RFC4279 supports authentication based on pre-shared keys (PSKs). These
>pre-shared keys are symmetric keys, shared in advance among the
>communicating parties.
I'm not a security dude, but just wanted to confirm that this is a
new pre-shared key per user, and the normal CLI passwords will not
be usable in this scheme, given that the passwords are not stored
on the router (or anywhere else), rather the salted or hashed version
of the password is stored, ala unix. Deploying new PSKs will be
an impediment to deployment.
Also: what is the impact of section 7.3 of rfc4279?
7.3. Identity Privacy
The PSK identity is sent in cleartext. Although using a user name or
other similar string as the PSK identity is the most straightforward
option, it may lead to problems in some environments since an
eavesdropper is able to identify the communicating parties. Even
when the identity does not reveal any information itself, reusing the
same identity over time may eventually allow an attacker to perform
traffic analysis to identify the parties. It should be noted that
this is no worse than client certificates, since they are also sent
in cleartext.
Does this mean we'll be announcing our netconf users' information
to would-be crackers? Is this identity as in "phil" or something
else?
Thanks,
Phil
--
to unsubscribe send a message to netconf-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://ops.ietf.org/lists/netconf/>