[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: Issue 79; digest-auth realm validation



> [Joe] I agree that the case that is interesting is when the RADIUS
> server supports RADIUS clients that support different realms. I don't
> see how it is possible that a RADIUS client will never see HTTP-style
> requests from other realms, but perhaps I am missing something.

Yes, I don't see this either.  Unless this document is attempting to
modify existing RADIUS proxy behavior, a proxy will automatically forward
an Access-Request containing a User-Name attribute with an NAI as it would
any other Access-Request.  So if the User-Name contains
"jsalowey@cisco.com" and that proxy is set up with a route to cisco.com
then it will forward the Access-Request to the indicated RADIUS server.

> [Joe] It seems that the compromised RADIUS client can pretend to be
> providing service for a different realm which in turn allows it to
> obtain the Digest-HA1 for users in another realm.  Both of these
> exposures are different than the ones you mention.

Yes, I agree this appears possible.

> [Joe] I believe it helps to mitigate the exposures above.  I am most
> concerned about the exposure of Digest-HA1 when the Digest-algorithm MD5
> is used.   There may be other issues, but that depends on what clients
> expect from a realm.

In fact, these attacks have already been carried out by Web servers and
have been used to compromise credentials via offline dictionary attacks.
So they are quite real.

--
to unsubscribe send a message to radiusext-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://psg.com/lists/radiusext/>