Re: [Hipsec] The simplest password authentication for HIP
Miika Komu <mkomu@cs.hut.fi> Thu, 13 May 2010 14:25 UTC
Return-Path: <mkomu@cs.hut.fi>
X-Original-To: hipsec@core3.amsl.com
Delivered-To: hipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7834F3A6B59 for <hipsec@core3.amsl.com>; Thu, 13 May 2010 07:25:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.113
X-Spam-Level:
X-Spam-Status: No, score=-5.113 tagged_above=-999 required=5 tests=[AWL=-1.114, BAYES_50=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id h8khHiwBrwZO for <hipsec@core3.amsl.com>; Thu, 13 May 2010 07:25:52 -0700 (PDT)
Received: from hutcs.cs.hut.fi (hutcs.cs.hut.fi [130.233.192.7]) by core3.amsl.com (Postfix) with ESMTP id AA7A13A6B73 for <hipsec@ietf.org>; Thu, 13 May 2010 07:25:25 -0700 (PDT)
Received: from hutcs.cs.hut.fi ([130.233.192.7] helo=[127.0.0.1]) by hutcs.cs.hut.fi with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.54) id 1OCZLd-0001ow-VM for hipsec@ietf.org; Thu, 13 May 2010 17:25:14 +0300
Message-ID: <4BEC0BCB.2010606@cs.hut.fi>
Date: Thu, 13 May 2010 17:25:15 +0300
From: Miika Komu <mkomu@cs.hut.fi>
User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.1.10pre) Gecko/20100422 Shredder/3.0.5pre
MIME-Version: 1.0
To: hipsec@ietf.org
References: <4BEC0879.8030902@htt-consult.com>
In-Reply-To: <4BEC0879.8030902@htt-consult.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Subject: Re: [Hipsec] The simplest password authentication for HIP
X-BeenThere: hipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "This is the official IETF Mailing List for the HIP Working Group." <hipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hipsec>
List-Post: <mailto:hipsec@ietf.org>
List-Help: <mailto:hipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 13 May 2010 14:25:53 -0000
On 13/05/10 17:11, Robert Moskowitz wrote: Hi, > The scenario is a client needs access to a server when it is not already > in the server's ACL and the server will ONLY accept ACL listed clients, > but has a password available. An example is a grid substation controller > as the server and a field engineer's tester as the client. In this > example, the engineer would be able to pull the password for the server > as part of the service call (as an example). > > In I2, ECHO_REQUEST_SIGNED is encrypted using PKCS-5 and the password, > then placed within the HIP ENCRYPT parameter. > > The advantages of this approach are: > > The server does not advertise in any manner that it accepts password > authentication for clients. If a client is not in its ACL or does not > provide the proper ENCRYPT parameter, the connection attempt is dropped. > > The password is never exposed to dictionary attack to silent listeners, > as it is encrypted by the DH derived key. > > It is EXTREMELY lightweight, not expanding HIP exchange by more than a > slightly larger ENCRYPT payload. > > The disadvantages of this approach are: > > The server has to go through most of the I2 processing to determine that > this is a password-based authentication. Though perhaps if the client is > NOT in its ACL it could process the ENCRYPT parameter before it checks > HIP_MAC and HIP_SIGNATURE? > > New use for ECHO_REQUEST_SIGNED and content for ENCRYPT. > > I can't come up with much else on a down side :) what about sending a hash of the password (and using a salt like in UNIX passwords)? This should offer some protection against tainted servers and password reuse... Btw, Samu's related draft is available from here: http://tools.ietf.org/html/draft-varjonen-hip-eap-00
- [Hipsec] The simplest password authentication for… Robert Moskowitz
- Re: [Hipsec] The simplest password authentication… Miika Komu
- Re: [Hipsec] The simplest password authentication… Robert Moskowitz
- Re: [Hipsec] The simplest password authentication… Miika Komu
- Re: [Hipsec] The simplest password authentication… Robert Moskowitz