Re: [Firebird-devel] Default setting for legacy secure plugin in firebird3

2011-12-20 Thread Alex Peshkoff
On 12/20/11 14:38, Adriano dos Santos Fernandes wrote: > On 20/12/2011 08:19, Alex Peshkoff wrote: >> On 12/20/11 13:54, Adriano dos Santos Fernandes wrote: >>> On 20/12/2011 06:57, Alex Peshkoff wrote: connect: client's public key, login and database name => server accept: server's

Re: [Firebird-devel] Default setting for legacy secure plugin in firebird3

2011-12-20 Thread Dimitry Sibiryakov
20.12.2011 11:25, Alex Peshkoff wrote: > please agree that if one knows > first 8 chars it's much simpler to guess/bruteforce/etc. the rest. As a man who don't use meaningless passwords, I have to agree. -- SY, SD. --

Re: [Firebird-devel] Default setting for legacy secure plugin in firebird3

2011-12-20 Thread Adriano dos Santos Fernandes
On 20/12/2011 08:19, Alex Peshkoff wrote: > On 12/20/11 13:54, Adriano dos Santos Fernandes wrote: >> On 20/12/2011 06:57, Alex Peshkoff wrote: >>> connect: client's public key, login and database name => server >>> accept: server's public key and salt => client >>> attach: client's proof =>

Re: [Firebird-devel] Default setting for legacy secure plugin in firebird3

2011-12-20 Thread Alex Peshkoff
On 12/20/11 14:19, Dimitry Sibiryakov wrote: > 20.12.2011 11:16, Dmitry Yemanov wrote: >> The new auth protocol will not truncate the longer password >> but the legacy one will, AFAIU. >In this case there is no security breath: if a malefactor has got > truncated password by > bruteforcing l

Re: [Firebird-devel] Default setting for legacy secure plugin in firebird3

2011-12-20 Thread Alex Peshkoff
On 12/20/11 14:06, Dimitry Sibiryakov wrote: > 20.12.2011 7:30, Alex Peshkoff wrote: >> Returning to that useful idea - the problem is that when the warning can >> be returned password was already passed to the net in legacy unsafe >> form. >But here you are saying that legacy form is unsafe.

Re: [Firebird-devel] Default setting for legacy secure plugin in firebird3

2011-12-20 Thread Dimitry Sibiryakov
20.12.2011 11:16, Dmitry Yemanov wrote: > The new auth protocol will not truncate the longer password > but the legacy one will, AFAIU. In this case there is no security breath: if a malefactor has got truncated password by bruteforcing legacy hash, it is useless. -- SY, SD. ---

Re: [Firebird-devel] Default setting for legacy secure plugin in firebird3

2011-12-20 Thread Alex Peshkoff
On 12/20/11 13:54, Adriano dos Santos Fernandes wrote: > On 20/12/2011 06:57, Alex Peshkoff wrote: >> connect: client's public key, login and database name => server >> accept: server's public key and salt => client >> attach: client's proof => server >> response: success if client's proof == s

Re: [Firebird-devel] Default setting for legacy secure plugin in firebird3

2011-12-20 Thread Dmitry Yemanov
20.12.2011 14:06, Dimitry Sibiryakov wrote: > AFAIR it is considered quite safe > since version 2.0 because of using SHA1. 8 chars of max password length can be brute-forced, I suppose that was the point. The new auth protocol will not truncate the longer password but the legacy one will, AFAIU

Re: [Firebird-devel] Default setting for legacy secure plugin in firebird3

2011-12-20 Thread Alex Peshkoff
On 12/20/11 13:46, Dmitry Yemanov wrote: > 20.12.2011 12:57, Alex Peshkoff wrote: > >> Certainly, and it's already done. With one exception - FB3 protocol >> begins authentication inside op_connect. That's absolutely backward >> compatible - I've added new tags to CNCT_ID block, and they are >> ce

Re: [Firebird-devel] Default setting for legacy secure plugin in firebird3

2011-12-20 Thread Dimitry Sibiryakov
20.12.2011 7:30, Alex Peshkoff wrote: > Returning to that useful idea - the problem is that when the warning can > be returned password was already passed to the net in legacy unsafe > form. But here you are saying that legacy form is unsafe. AFAIR it is considered quite safe since version 2.

Re: [Firebird-devel] Default setting for legacy secure plugin in firebird3

2011-12-20 Thread Adriano dos Santos Fernandes
On 20/12/2011 06:57, Alex Peshkoff wrote: > connect: client's public key, login and database name => server > accept: server's public key and salt => client > attach: client's proof => server > response: success if client's proof == server's proof > > What I would like to know is that if there i

Re: [Firebird-devel] Default setting for legacy secure plugin in firebird3

2011-12-20 Thread Dmitry Yemanov
20.12.2011 12:57, Alex Peshkoff wrote: > Certainly, and it's already done. With one exception - FB3 protocol > begins authentication inside op_connect. That's absolutely backward > compatible - I've added new tags to CNCT_ID block, and they are > certainly just ignored by older servers. For FB3 cl

Re: [Firebird-devel] Default setting for legacy secure plugin in firebird3

2011-12-20 Thread Alex Peshkoff
On 12/20/11 11:47, Dmitry Yemanov wrote: > 20.12.2011 10:30, Alex Peshkoff wrote: > >> Returning to that useful idea - the problem is that when the warning can >> be returned password was already passed to the net in legacy unsafe >> form. That's not too big problem if this is password for FB<3. T

Re: [Firebird-devel] Default setting for legacy secure plugin in firebird3

2011-12-19 Thread Alex Peshkoff
On 12/20/11 11:43, Dmitry Yemanov wrote: > 19.12.2011 20:58, Alex Peshkoff wrote: >> From security POV it's absolutely clear that we should use SRP as >> default authentication plugin and should not mention legacy >> authentication in default list of plugins on server. (This means that >> people m

Re: [Firebird-devel] Default setting for legacy secure plugin in firebird3

2011-12-19 Thread Dmitry Yemanov
20.12.2011 10:30, Alex Peshkoff wrote: > Returning to that useful idea - the problem is that when the warning can > be returned password was already passed to the net in legacy unsafe > form. That's not too big problem if this is password for FB<3. The worst > case is when user mixed two servers a

Re: [Firebird-devel] Default setting for legacy secure plugin in firebird3

2011-12-19 Thread Dmitry Yemanov
19.12.2011 20:58, Alex Peshkoff wrote: > > From security POV it's absolutely clear that we should use SRP as > default authentication plugin and should not mention legacy > authentication in default list of plugins on server. (This means that > people must upgrade clients, but this does not look li

Re: [Firebird-devel] Default setting for legacy secure plugin in firebird3

2011-12-19 Thread Alex Peshkoff
On 12/19/11 21:43, Dimitry Sibiryakov wrote: > 19.12.2011 17:58, Alex Peshkoff wrote: >> but here security problem >> comes. User will not know, does he work with new server (using secure >> channel) or with old one (insecure channel). >Make isc_attach_database() to return warning if insecure

Re: [Firebird-devel] Default setting for legacy secure plugin in firebird3

2011-12-19 Thread Alex Peshkoff
On 12/19/11 21:43, Dimitry Sibiryakov wrote: > 19.12.2011 17:58, Alex Peshkoff wrote: >> but here security problem >> comes. User will not know, does he work with new server (using secure >> channel) or with old one (insecure channel). >Make isc_attach_database() to return warning if insecure

Re: [Firebird-devel] Default setting for legacy secure plugin in firebird3

2011-12-19 Thread Dimitry Sibiryakov
19.12.2011 17:58, Alex Peshkoff wrote: > but here security problem > comes. User will not know, does he work with new server (using secure > channel) or with old one (insecure channel). Make isc_attach_database() to return warning if insecure channel is used. -- SY, SD. --

[Firebird-devel] Default setting for legacy secure plugin in firebird3

2011-12-19 Thread Alex Peshkoff
Hi, all! I'm ready to commit secure remote passwords and related changes to svn. But before I'd like to know your mind regarding default settings for secure plugins. SRP provides a very reliable way to authenticate user by password, being resistant to a lot of attacks, including man in the middle