Re: [TLS] about the PWD Proposal

Yaron Sheffer <yaronf.ietf@gmail.com> Mon, 21 November 2011 22:16 UTC

Return-Path: <yaronf.ietf@gmail.com>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2849D21F8ABD for <tls@ietfa.amsl.com>; Mon, 21 Nov 2011 14:16:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.999
X-Spam-Level:
X-Spam-Status: No, score=-102.999 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, J_CHICKENPOX_43=0.6, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GIfTmRQvY5yb for <tls@ietfa.amsl.com>; Mon, 21 Nov 2011 14:16:08 -0800 (PST)
Received: from mail-bw0-f44.google.com (mail-bw0-f44.google.com [209.85.214.44]) by ietfa.amsl.com (Postfix) with ESMTP id CB74421F8880 for <tls@ietf.org>; Mon, 21 Nov 2011 14:16:07 -0800 (PST)
Received: by bkbzv15 with SMTP id zv15so8149578bkb.31 for <tls@ietf.org>; Mon, 21 Nov 2011 14:16:06 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=message-id:date:from:user-agent:mime-version:to:subject:references :in-reply-to:content-type:content-transfer-encoding; bh=HgNQTzaw3j08uFQIOgeEVSzf3ttRwE1rqk2DIwXEtTk=; b=MXuQEznYq4a3/Iz9aCkaA87/IqlbNz34krvks9ZoqHhmtno15Nv1Dc20J7RrWZtITo fdyhpEDjiaqjtVAM+MguggzTSrqPr6c7b/a7+K7XwcqbiSePdXc1x7uN/gFxy0+fSF44 mvjXGKF3g6N3UDyk4lY5TQv/TrpquKCh3ZOBo=
Received: by 10.204.149.216 with SMTP id u24mr15896679bkv.73.1321913766768; Mon, 21 Nov 2011 14:16:06 -0800 (PST)
Received: from [10.0.0.4] (bzq-79-183-226-89.red.bezeqint.net. [79.183.226.89]) by mx.google.com with ESMTPS id x19sm16836859fag.5.2011.11.21.14.16.05 (version=SSLv3 cipher=OTHER); Mon, 21 Nov 2011 14:16:06 -0800 (PST)
Message-ID: <4ECACDA3.4000003@gmail.com>
Date: Tue, 22 Nov 2011 00:16:03 +0200
From: Yaron Sheffer <yaronf.ietf@gmail.com>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:7.0.1) Gecko/20110929 Thunderbird/7.0.1
MIME-Version: 1.0
To: tls@ietf.org
References: <mailman.1210.1321701345.3024.tls@ietf.org>
In-Reply-To: <mailman.1210.1321701345.3024.tls@ietf.org>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Subject: Re: [TLS] about the PWD Proposal
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tls>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 Nov 2011 22:16:12 -0000

In a somewhat related protocol (IKEv2 with PACE for authentication), we 
added an appendix on password salting: 
http://tools.ietf.org/html/draft-kuegler-ipsecme-pace-ikev2-08#appendix-B. 
The setting there is a little different from tls-pwd, because IKE is 
normally symmetric (peer to peer vs. client to server). But some of our 
analysis does apply. In particular, dynamically replacing the short 
credentials by a long shared secret ( 
http://tools.ietf.org/html/draft-kuegler-ipsecme-pace-ikev2-08#appendix-B.3) 
would mitigate much of the risk.

Thanks,
     Yaron

-----
  Hi,
  I am interested in the PWD proposal at the meeting, and run through it(http://tools.ietf.org/html/draft-harkins-tls-pwd-01#section-3.4),
  and have the following concerns:

1. In the document, it  says both Client and Server should be able to compute PE, which is derived from username, password, salt,etc.
    That means Client or the user should also remember the salt value, in that case, salt is meaningless and can be replaced by a longer password.
    This is quite different from the widely known usage of salt, e.g. in UNIX operating system, salt is not required to remember by the user, but by server to fetch locally by reference to the username.
   And as far as I know, I am sure the authors also know that, other password based key exchanges protocols don't involve salt, but store a hash value of password among other things locally.

> I realize that this is very different from the usage in UNIX operating systems, but it is necessary, as the UNIX (or other) operating system running the web server has to store the password. Storing the password in the clear on as an unsalted hash is worse than storing a salted hash (or "base" in the draft's terminology), so that is what the TLS server does. The use of base instead of password is not to protect the password during handshake, but to protect it during storage on the server.
>
> Having said that, I think it is now very practical to take a list of the 100,000 most popular passwords on the web, a database of 10,000 salted hashes (the file described in section 3.4), and find all the matches. That's 1,000,000,000 operations, which would take 15 minutes on a MacBook Air (1.4 GHz). I think the days of saying that a database of salted hashes makes theft of the password file irrelevant should be over. Yes, I know that with unsalted hash it would be practical to test the 100,000,000 most popular passwords.
>
> session cookies somehow (e.g., via the BEAST attack): but if you don't
> have my OBCs' private keys then you can't actually make use of my
> cookies.
>
> With OBC cookie theft is not enough.  With OBC the attacker must get
> at the private keys for the OBCs.
>
> Also, with OBC you get closer to true logout: destroy ("forget") your
> OBC private keys and your sessions are as good as dead.  Moreover, the
> user-agent, not the server, is in control of maximum session lifetime,
> since there's no point in the server setting cookies that will outlive
> the OBCs.
> I we can find no other use case, we might want to rename it to "Origin Bound Cookie".
>
> But that would require some interesting interaction between layers.
>
> Are all cookies received while using OBC considered (by the client!) bound to the OBC? If not, the client might use an old cookie after a logout event, leading to the server falsely detecting an attempt to forge a cookie. Maybe we need a new keyword on the cookie header.
>
> Where is the "logout" button?  If it's part of the website (in the "canvas") how does the HTML/HTTP tell the browser to log out? Probably best to have it in the Chrome for sites where OBC are supported.