On 5/27/2013 2:53 AM, Alex Peshkoff wrote:
> On 05/26/13 19:53, Mark Rotteveel wrote:
>
>> If I understand it correctly, the new wire encryption of FB 3 uses RC4,
>> an encryption with known attacks and vulnerabilities. Wouldn't it be
>> better to research other options?
> RC4 is not more than default wire encryption plugin - if you really do
> not trust it you can easily write your own.
>
>
> On 05/26/13 21:36, Jim Starkey wrote:
>
>> I don't know what Firebird is now using for password validation, but I
>> strongly suggest that somebody look closely at SRP (secure remote
>> password) to generate session keys.
> Use of SRP to generate keys for RC4 is default option in FB3.
>
>> SRP is immune to all but brute force attacks, doesn't require that a
>> server store anything which, if compromised, would allow password (or
>> surrogates) to be computed, and requires a single round trip for
>> authentication.
>>
> In current network protocol client sends login name and SRP public key
> to server in connect packet. Server's public key and salt are returned
> to client accept packet. Hash of session key is sent from client to
> server in attach (or create) packet as a clumplet in DPB. I.e. no
> additional roundtrip at this step compared with legacy authentication.
>
>

Is the attach package encrypted with the session key?  If so, the hash 
of the session key isn't necessary.  If not, the exchange is susceptible 
to a man-in-the-middle attack with a buggered DPB.


------------------------------------------------------------------------------
Try New Relic Now & We'll Send You this Cool Shirt
New Relic is the only SaaS-based application performance monitoring service 
that delivers powerful full stack analytics. Optimize and monitor your
browser, app, & servers with just a few lines of code. Try New Relic
and get this awesome Nerd Life shirt! http://p.sf.net/sfu/newrelic_d2d_may
Firebird-Devel mailing list, web interface at 
https://lists.sourceforge.net/lists/listinfo/firebird-devel

Reply via email to