On Oct 21, 2010, at 3:58 PM, Alex Milowski wrote:

> On Thu, Oct 21, 2010 at 3:53 PM, Kurt Zeilenga <kurt.zeile...@isode.com> 
> wrote:
>> 
>> I have number of concerns.
>> 
>> I am concerned that a client or the user would not know why SASL 
>> authentication was being offered, what id to use, etc..   Aside from user 
>> confusion, I fear attackers will actually highjack the S2S connections 
>> between the S2S server and the MUC server, offer SASL/PLAIN (or terribly 
>> weak mechanism) to the clients in hopes users will enter the password they 
>> use to authenticate to their server.
>> 
>> I rather not open such attack doors.
> 
> I'm not sure we are talking about the same thing.  I want to use
> something like DIGEST
> authentication to send the *room* credentials and not the user's credentials.

The suggestion was to use SASL.  SASL is designed to authenticate users to 
services (and services to users).  Users are easily confused as to which 
service they are authenticating to, and this leads to various attacks well 
mounted.  If you offer SASL authentication to the MUC service, there will be 
demands that it support only 'room password' authentication, but user to MUC 
service authentication.

Now, if we talk about use of something that is only 'something like' a SASL 
mechanism, such as SCRAM, I think we need to consider what the threats are, and 
whether or not any particular solution adequately mitigates those threats.

My view is that the key threat to use plain passwords is the threat that an 
eavesdropper can subscribe to the room at will.   My solution, I believe, 
adequately addresses this threat by use of a simple hash of the password and 
other data to ensure it not readily usable by eavesdroppers.  The inclusion of 
subscribers jid and room jid in the hash means the eavesdropper has to highjack 
the subscriber's server (or its sessions) to use the hash.  And inclusion of 
the time-stamp (and muc service checks of that the time-stamp is within some 
configurable window), limits the window of such attacks. This, I feel, is more 
than than adequate mitigation of this key threat.

> 
> I don't see how having a non-cleartext authentication mechanism for
> MUC rooms changes any security issues that might already be present
> via a MUC room service.

Certainly non-cleartext authentication doesn't actually mitigate any of the 
more severe (than the eavesdropper threat discussed above) threats to the MUC 
service.

However, introduction of a second authentication approach will actually 
introduce some threats which are not present today.  For instance, such 
introduction will introduce a downgrade attack (though if we worry about active 
attacks, we got lots of things to worry about).

Now, given that I've suggested a non-cleartext authentication mechanism, it 
should be obvious that I'm not opposed to the introduction of such in 
principle.  However, I think we need to take care not to overly complicate the 
solution, for instance, by the introduction of SASL-based MUC authentication, 
as doing will lead to introduction of even more threats.

> 
> 
>> 
>> As previously noted in this thread, one can mitigate replay attacks by 
>> including a timestamp in the hash (as well as subscriber and room jids)... 
>> and the replay can only be mounted by someone who takes control of the 
>> subscriber's server or S2S sessions or C2S sessions.  If an attacker has 
>> comprised the system to the point of being able to replay, they generally 
>> would have the ability to mount a wide range of attacks which SASL 
>> authentication by itself will do little to protect against.
> 
> That's the point of using a nonce and other aspects of various
> challenge base authentication mechanism.  I don't see why we would
> develop a new method.

Well, it's the "just use SASL" suggestion I am objecting to.  I less mind 
something simply based on existing authentication method.

However, I prefer a mechanism that doesn't have a significant additional 
round-trip burden.   Round-trips are very expensive in some systems.

One of the nice things about the approach I suggest is that it introduces zero 
additional round-trips.

> 
> -- 
> --Alex Milowski
> "The excellence of grammar as a guide is proportional to the paucity of the
> inflexions, i.e. to the degree of analysis effected by the language
> considered."
> 
> Bertrand Russell in a footnote of Principles of Mathematics
> _______________________________________________
> JDev mailing list
> Forum: http://www.jabberforum.org/forumdisplay.php?f=20
> Info: http://mail.jabber.org/mailman/listinfo/jdev
> Unsubscribe: jdev-unsubscr...@jabber.org
> _______________________________________________

_______________________________________________
JDev mailing list
Forum: http://www.jabberforum.org/forumdisplay.php?f=20
Info: http://mail.jabber.org/mailman/listinfo/jdev
Unsubscribe: jdev-unsubscr...@jabber.org
_______________________________________________

Reply via email to