[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: Follow up on Authorize Only issue
Well I am not exactly against using an Authorize Only in this way.
I do recognize that there is a severe security issue.
However, I still think designers need to be aware of the issues and
design appropriately.
We in the IETF need to make sure that designers are aware of the
security risk of a particular feature. That is afterall what the
Security section is about.
> -----Original Message-----
> From: owner-radiusext@ops.ietf.org
> [mailto:owner-radiusext@ops.ietf.org] On Behalf Of Bernard Aboba
> Sent: Sunday, July 23, 2006 5:31 PM
> To: aland@nitros9.org
> Cc: isms@ietf.org; radiusext@ops.ietf.org
> Subject: Re: Follow up on Authorize Only issue
>
> >A compromised NAS can leverage this requested feature to obtain that
> >information more readily. Right now, if the NAS hasn't had
> a user log
> >in through it, it can get those credentials only through a
> brute force
> >attack on the password. The server *should* be able to catch that
> >attack, mitigating the vulnerability.
>
> Right.
>
> > > If this is allowed, it should follow the principle of "least
> > > privilege", only providing the attributes relevant to SSH.
> >
> >Which means that the Access-Request has to be recognizable
> as for SSH
> >in this use-case. This means an attribute or value specifically for
> >this purpose. The RADIUS server can then key off of that special
> >request, and return a limited response.
>
> Right. For example an additional Service-Type value of "SSH"
> could be allocated One concern would be whether an attacker
> could use this Service-Type with any NAS-Port-Type, in order
> to retrieve attributes relevant to that NAS-Port-Type. To
> prevent this, one possibility is to add NAS-Port-Type values
> of "SSH" and "ISMS" (since different attributes might be
> returned for a straight SSH or SSH-protected ISMS session)
> and only allow Service-Type="SSH" to be used with those
> NAS-Port-Type values; all other NAS-Port-Type values would
> result in an Access-Reject.
>
> >The use case should also enumerate the possible attributes
> and values
> >needed in the Access-Accept, and state explicitely that
> responding with
> >any other attributes or values may result in security
> violations. i.e.
> >Other attributes and values SHOULD NOT be sent in the Access-Accept.
>
> Makes sense.
>
>
>
> --
> to unsubscribe send a message to
> radiusext-request@ops.ietf.org with the word 'unsubscribe' in
> a single line as the message text body.
> archive: <http://psg.com/lists/radiusext/>
>
--
to unsubscribe send a message to radiusext-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://psg.com/lists/radiusext/>