[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Follow up on Authorize Only issue



A compromised NAS can leverage this requested feature to obtain
that information more readily.  Right now, if the NAS hasn't had a
user log in through it, it can get those credentials only through a
brute force attack on the password.  The server *should* be able to
catch that attack, mitigating the vulnerability.
Right.

> If this is allowed, it should follow the principle of "least privilege",
> only providing the attributes relevant to SSH.

Which means that the Access-Request has to be recognizable as for
SSH in this use-case.  This means an attribute or value specifically
for this purpose.  The RADIUS server can then key off of that special
request, and return a limited response.
Right.  For example an additional Service-Type value of "SSH" could be 
allocated One concern would be whether an attacker could use this 
Service-Type with any NAS-Port-Type, in order to retrieve attributes 
relevant to that NAS-Port-Type.  To prevent this,  one possibility is to add 
NAS-Port-Type values of "SSH" and "ISMS" (since different attributes might 
be returned for a straight SSH or SSH-protected ISMS session) and only allow 
Service-Type="SSH" to be used with those NAS-Port-Type values; all other 
NAS-Port-Type values would result in an Access-Reject.
The use case should also enumerate the possible attributes and
values needed in the Access-Accept, and state explicitely that
responding with any other attributes or values may result in security
violations.  i.e. Other attributes and values SHOULD NOT be sent in
the Access-Accept.
Makes sense.



--
to unsubscribe send a message to radiusext-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://psg.com/lists/radiusext/>