[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Follow up on Authorize Only issue
"Bernard Aboba" <bernard_aboba@hotmail.com> wrote:
> For example, should a NAS be able to retrieve the Tunnel-Password attribute
> of any user, regardless of whether they are connected?
i.e. A compromised NAS can leverage this requested feature to obtain
that information more readily. Right now, if the NAS hasn't had a
user log in through it, it can get those credentials only through a
brute force attack on the password. The server *should* be able to
catch that attack, mitigating the vulnerability.
For users who have logged in through a compromised NAS, nearly all
hope for security is lost.
> If this is allowed, it should follow the principle of "least privilege",
> only providing the attributes relevant to SSH.
Which means that the Access-Request has to be recognizable as for
SSH in this use-case. This means an attribute or value specifically
for this purpose. The RADIUS server can then key off of that special
request, and return a limited response.
The use case should also enumerate the possible attributes and
values needed in the Access-Accept, and state explicitely that
responding with any other attributes or values may result in security
violations. i.e. Other attributes and values SHOULD NOT be sent in
the Access-Accept.
Alan DeKok.
--
to unsubscribe send a message to radiusext-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://psg.com/lists/radiusext/>