[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: issue: draft-ietf-radext-digest-auth-06.txt Digest MD5-sess



On Thu, 5 Jan 2006, Avi Lior wrote:

So one example is in Mobile IP.  Once the HA has validated the
Registration Request or Binding Update with RADIUS.  It can continue to
authentication subsequent bind request or Registration Request received
from that user. This is only limited by a lifetime received from the AAA
server.
Which is very similar to what is provided by Digest MD5-sess. The 
credentials given to the RADIUS client is only good for validating within 
a good credibility that next messages is in the same user session. It can 
not be reused in authentication to any other service, or even to start a 
new session or renew the existing session to the same service.
Giving avay the non-session Digest MD5 HA1 is a completely different 
think. It's in the Digest world almost equivalent to giving away the users 
plaintext password.
The only security issue with the MD5-sess HA1 in session mode that I can 
see is it SHOULD be transmitted securely IF MD5-sess is used in session 
mode or if message integrity protection is used as knowledge of the 
MD5-sess HA1 hash allows for limited session theft, limited by session 
nonce count and time limits enforced by the service. But as soon as the 
server-side nonce expires the hash is completely useless for any 
meaningful purposes.


My notes on security issues of the Digest-HA1 attribute in general and it's use in Digest session authentication in particular:

MD5, any mode of operation:

Equivalent to plaintext for any service using Digest authentication. Knowledge of the MD5 HA1 allow for full theft of the account on the service/realm until the password or realm is changed, and consequently also full control of integrity protection of both requests and responses.
MD5-sess, one request per nonce:

No session theft is possible as the sessions only last for a single message.
But knowing the HA1 allows breaking any response integrity protection. 
Request integrity is protected however as the HA1 is only known after the 
request has been received and processed by the service.
MD5-sess, session based:

In addition to the above it allows for session theft for as long as that session is considered valid by the service, including request/response integrity protection (except for the first message). Session length is usually limited by both nonce count (number of requests) and time. The RADIUS server may hint both session limits to the client, but can not enforce it.

Senario 1 mode of operation:

If Senario 1 mode of operation is allowed then it mau be considerably easier for an attacker to gain access to the HA1. If Scenario 1 mode of operation is allowed then he only needs to be able to see the application protocol traffic and have access to any RADIUS client allowed to query the RADIUS server in this mode to gain access to the Digest-HA1 by replaying the seen Digest message details to the RADIUS server. Transport protection of the Digest-HA1 attribute does not help against this.


Regards
Henrik

--
to unsubscribe send a message to radiusext-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://psg.com/lists/radiusext/>