[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: Follow up on Authorize Only issue (was RE: [Isms] ISMS session summary)



Avi Lior writes...
 
> I am having trouble understanding "user that is not actually present".

In the proposed use case, the NAS could request, from a RADIUS server,
authorization information for a user that it asserts is present, but is
not.  The RADIUS server cannot tell, since no user credentials are
presented.  Well behaved NASes won't do this.  One might argue that all
trusted NASes will be well behaved, but that makes certain threat model
assumptions.

Why would a (compromised) NAS want to do this?  Well, leaking
authorization information on various user accounts may help an attacker
select high value target accounts. 

The only standardized scenario for non-authenticated authorization
RADIUS is call check.  The assumption is that the PSTN is a reliable
source of the telephone number(s), the NAS is trusted and
non-compromised, and the user will typically be authenticated once the
session is initiated.  Thus, the risk is relatively low.

For Dynamic RADIUS, RFC 3576 requires a State attribute, which can only
have come from a previous successful authentication.

In this particular ISMS use case, SNMP service is authorized based on
the assertion of identity of the user by the NAS, without the RADIUS
server ever having performed an authentication, and without the benefit
of the resultant State attribute.  Thus, the risk is potentially higher.

The questions at hand are whether the risk is high enough to be of
serious concern, and whether or not it can be mitigated?


--
to unsubscribe send a message to radiusext-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://psg.com/lists/radiusext/>