Adam Tauno Williams wrote:

From my interest in applied cryptography, I was surprised to see how limited are the (open)LDAP directory entry encryption options. From a security audit perspective, plain text passwords in the LDAP DSA implementation appears worrysome.


Why?  If your DSA(s) is/are breached - your screwed anyway.  The worry
seems almost entirely theoretical to me.


That's would be an insider fraud mitigation mechanism: prevent the support personnel from easy access to finance department passwords. E.g. Sarbanes-Oxley scrutiny.

A DSA host should be sufficiently hardened and backups should be
encrypted.  Physical access to servers should be restricted and
monitored.  There is lots of sensitive data in most DSAs beyond
passwords.


Granted, I didn't do a security audit of a DSA implementation.

Thanks for your observations.

Regards,

--

- Thierry Moreau

CONNOTECH Experts-conseils inc.
9130 Place de Montgolfier
Montreal, Qc
Canada   H2M 2A1

Tel.: (514)385-5691
Fax:  (514)385-5900

web site: http://www.connotech.com
e-mail: [EMAIL PROTECTED]


---
You are currently subscribed to ldap@umich.edu as: [EMAIL PROTECTED]
To unsubscribe send email to [EMAIL PROTECTED] with the word UNSUBSCRIBE as the 
SUBJECT of the message.

Reply via email to