Re: [Hipsec] The simplest password authentication for HIP

Miika Komu <mkomu@cs.hut.fi> Thu, 13 May 2010 14:25 UTC

Return-Path: <mkomu@cs.hut.fi>
X-Original-To: hipsec@core3.amsl.com
Delivered-To: hipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7834F3A6B59 for <hipsec@core3.amsl.com>; Thu, 13 May 2010 07:25:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.113
X-Spam-Level:
X-Spam-Status: No, score=-5.113 tagged_above=-999 required=5 tests=[AWL=-1.114, BAYES_50=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id h8khHiwBrwZO for <hipsec@core3.amsl.com>; Thu, 13 May 2010 07:25:52 -0700 (PDT)
Received: from hutcs.cs.hut.fi (hutcs.cs.hut.fi [130.233.192.7]) by core3.amsl.com (Postfix) with ESMTP id AA7A13A6B73 for <hipsec@ietf.org>; Thu, 13 May 2010 07:25:25 -0700 (PDT)
Received: from hutcs.cs.hut.fi ([130.233.192.7] helo=[127.0.0.1]) by hutcs.cs.hut.fi with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.54) id 1OCZLd-0001ow-VM for hipsec@ietf.org; Thu, 13 May 2010 17:25:14 +0300
Message-ID: <4BEC0BCB.2010606@cs.hut.fi>
Date: Thu, 13 May 2010 17:25:15 +0300
From: Miika Komu <mkomu@cs.hut.fi>
User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.1.10pre) Gecko/20100422 Shredder/3.0.5pre
MIME-Version: 1.0
To: hipsec@ietf.org
References: <4BEC0879.8030902@htt-consult.com>
In-Reply-To: <4BEC0879.8030902@htt-consult.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Subject: Re: [Hipsec] The simplest password authentication for HIP
X-BeenThere: hipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "This is the official IETF Mailing List for the HIP Working Group." <hipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hipsec>
List-Post: <mailto:hipsec@ietf.org>
List-Help: <mailto:hipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 13 May 2010 14:25:53 -0000

On 13/05/10 17:11, Robert Moskowitz wrote:

Hi,

> The scenario is a client needs access to a server when it is not already
> in the server's ACL and the server will ONLY accept ACL listed clients,
> but has a password available. An example is a grid substation controller
> as the server and a field engineer's tester as the client. In this
> example, the engineer would be able to pull the password for the server
> as part of the service call (as an example).
>
> In I2, ECHO_REQUEST_SIGNED is encrypted using PKCS-5 and the password,
> then placed within the HIP ENCRYPT parameter.
>
> The advantages of this approach are:
>
> The server does not advertise in any manner that it accepts password
> authentication for clients. If a client is not in its ACL or does not
> provide the proper ENCRYPT parameter, the connection attempt is dropped.
>
> The password is never exposed to dictionary attack to silent listeners,
> as it is encrypted by the DH derived key.
>
> It is EXTREMELY lightweight, not expanding HIP exchange by more than a
> slightly larger ENCRYPT payload.
>
> The disadvantages of this approach are:
>
> The server has to go through most of the I2 processing to determine that
> this is a password-based authentication. Though perhaps if the client is
> NOT in its ACL it could process the ENCRYPT parameter before it checks
> HIP_MAC and HIP_SIGNATURE?
>
> New use for ECHO_REQUEST_SIGNED and content for ENCRYPT.
>
> I can't come up with much else on a down side :)

what about sending a hash of the password (and using a salt like in UNIX 
passwords)? This should offer some protection against tainted servers 
and password reuse...

Btw, Samu's related draft is available from here:

http://tools.ietf.org/html/draft-varjonen-hip-eap-00