[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Password-based user authentication with Netconf over TLS
Hi Phil,
Phil Shafer writes :
badra@isima.fr writes:
RFC4279 supports authentication based on pre-shared keys (PSKs). These
pre-shared keys are symmetric keys, shared in advance among the
communicating parties.
I'm not a security dude, but just wanted to confirm that this is a
new pre-shared key per user, and the normal CLI passwords will not
be usable in this scheme, given that the passwords are not stored
on the router (or anywhere else), rather the salted or hashed version
of the password is stored, ala unix. Deploying new PSKs will be
an impediment to deployment.
So what about using the stored hash or about replacing the password with
the hash version as shown in the following formula?
PSK = SHA-1(stored-hash + "Key Pad for Netconf" + psk_identity_hint)
Also: what is the impact of section 7.3 of rfc4279?
7.3. Identity Privacy
The PSK identity is sent in cleartext. Although using a user name or
other similar string as the PSK identity is the most straightforward
option, it may lead to problems in some environments since an
eavesdropper is able to identify the communicating parties. Even
when the identity does not reveal any information itself, reusing the
same identity over time may eventually allow an attacker to perform
traffic analysis to identify the parties. It should be noted that
this is no worse than client certificates, since they are also sent
in cleartext.
Does this mean we'll be announcing our netconf users' information
to would-be crackers? Is this identity as in "phil" or something
else?
The traffic analysis by here means that an intruder can learn who is
reaching the network, when, and from where, and hence can correlate the
user identity to the connection location.
RFC4279 does not provide credentials protection and then any info
related to the user identity is sent in clear text. However TLS
renegotiation (re-handshake) implements a way to avoid sending the user
identity and credentials in clear text: doing a TLS Handshake with only
server authentication, and then a second authentication with mutual
authentication (all second handshake messages are sent encrypted).
Best regards,
--
Mohamad Badra
CNRS - LIMOS Laboratory
--
to unsubscribe send a message to netconf-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://ops.ietf.org/lists/netconf/>