Re: [vwrap] authentication : remove reference to MD5
Meadhbh Hamrick <ohmeadhbh@gmail.com> Tue, 06 April 2010 22:01 UTC
Return-Path: <ohmeadhbh@gmail.com>
X-Original-To: vwrap@core3.amsl.com
Delivered-To: vwrap@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix)
with ESMTP id 329333A699A for <vwrap@core3.amsl.com>;
Tue, 6 Apr 2010 15:01:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.481
X-Spam-Level:
X-Spam-Status: No, score=-2.481 tagged_above=-999 required=5 tests=[AWL=0.118,
BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com
[127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Zzs9tczTfMCM for
<vwrap@core3.amsl.com>; Tue, 6 Apr 2010 15:01:50 -0700 (PDT)
Received: from mail-qy0-f181.google.com (mail-qy0-f181.google.com
[209.85.221.181]) by core3.amsl.com (Postfix) with ESMTP id E027F3A68A5 for
<vwrap@ietf.org>; Tue, 6 Apr 2010 15:01:43 -0700 (PDT)
Received: by qyk11 with SMTP id 11so393348qyk.13 for <vwrap@ietf.org>;
Tue, 06 Apr 2010 15:01:38 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma;
h=domainkey-signature:mime-version:received:in-reply-to:references
:from:date:received:message-id:subject:to:content-type
:content-transfer-encoding; bh=Bg4M/Mf5h24ZaVNctX8N7lkfVxEIzBNUJftOSYwzAl4=;
b=tjeX4fd7VadrRqHOWJvotLDw40oolCwcN0vHzpHMM4CSBB51lRc2sSfJMRq4Gcrrdk
VCdrdEiKtPUO5l8K/HeiZV2794NY81elWgy3YUttRRIdTv4v2wzWlbKNVCDvm7LD14pN
MUahlYnx8v8GSw/F1n6R4B1XNy23ctAyT7DBI=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma;
h=mime-version:in-reply-to:references:from:date:message-id:subject:to
:content-type:content-transfer-encoding;
b=ccuR1qQRIBz63WbgfxNNFUeL3/VohrDM0t8ilZkLrmBbie5eoYmkkLcaH9R9K1ei6E
HVg/ow4TYpXM+gM4GF+Md0mX0bxsYVOgc0ispaQMfpBYmi2028e+e6UB7xpWvCAjJqEy
v1ySmGbty0fiaLR33ozzSLQ/X0PULAetBpvuk=
MIME-Version: 1.0
Received: by 10.229.247.72 with HTTP; Tue, 6 Apr 2010 15:01:18 -0700 (PDT)
In-Reply-To: <r2j6c9fcc2a1004061425w7efff62fu7d6647048a6d92d3@mail.gmail.com>
References: <v2zb325928b1004060719nadbc4f76h1be1c4463578fc4a@mail.gmail.com>
<4BBB7705.4060206@stpeter.im>
<u2vb325928b1004061122u36b2d85cs2a243f2de9231505@mail.gmail.com>
<r2j6c9fcc2a1004061425w7efff62fu7d6647048a6d92d3@mail.gmail.com>
From: Meadhbh Hamrick <ohmeadhbh@gmail.com>
Date: Tue, 6 Apr 2010 15:01:18 -0700
Received: by 10.229.241.66 with SMTP id ld2mr1233399qcb.78.1270591298173;
Tue, 06 Apr 2010 15:01:38 -0700 (PDT)
Message-ID: <v2nb325928b1004061501xd6e9902an582dbdbcf16c6b83@mail.gmail.com>
To: Barry Leiba <barryleiba@computer.org>, vwrap@ietf.org
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Subject: Re: [vwrap] authentication : remove reference to MD5
X-BeenThere: vwrap@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Virtual World Region Agent Protocol - IETF working group
<vwrap.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/vwrap>,
<mailto:vwrap-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/vwrap>
List-Post: <mailto:vwrap@ietf.org>
List-Help: <mailto:vwrap-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/vwrap>,
<mailto:vwrap-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 06 Apr 2010 22:01:51 -0000
yes. but until the migration is complete for all users, do we implement the new spec with SHA256? do well tell users they have until a certain date to login and regenerate the hash? it would be nice if we could have SOME reverse compatibility so we could use the maintenance facility to do the rehashing. so you could: 1. on a certain date, stop returning seed caps from a successful login with MD5, but include a maintenance cap with an URL pointing to a page users can use to rehash their password. 2. at the web page, users re-enter their password, it's hashed with SHA256 and it's stored in the database. 3. the next time that user logs in, they hash their password with SHA256 instead of MD5 and avoid having to go through the process again. 4. at some point in the future, you disable logins for people with only MD5 hashed passwords (maybe). what we would need to make this work would be: a. a way to log in with MD5 until you can use VWRAP to carry the SHA256 password. b. a way to figure out which hashed password to send (MD5 or SHA256). in the case of second life, you probably COULD get away with using MD5 with the legacy protocol. i can't remember if the current legacy protocol supports maintenance caps. if it does you could use a maintenance cap. if not, you simply fail and wait for the user to call the support line. this would be pretty costly, but if we really want to avoid legacy in the new protocol, we're probably going to see a number of issues like this. if we had just enough legacy in the new protocol to support MD5, we could use the maintenance capability as described above. if we added a return value from the auth request that had the meaning of "unsupported algorithm" the client would know to retry the MD5 request with SHA256. just my $0.02. -cheers -meadhbh -- meadhbh hamrick * it's pronounced "maeve" @OhMeadhbh * http://meadhbh.org/ * OhMeadhbh@gmail.com On Tue, Apr 6, 2010 at 2:25 PM, Barry Leiba <barryleiba.mailing.lists@gmail.com> wrote: >> so if we simply said "we're going to ditch MD5 in favor of SHA256" >> there would be a problem with reverse compatibility of the >> authentication data. this is because you can't generate the pre-image >> from an MD5 MIC and then use it to generate a SHA256 MIC. (or you >> can't do that in a way that insures that your MD5 pre image is the >> same as the password.) > > The usual way to handle this is with a migration process. Credentials > are re-hashed with the new algorithm when they're changed, over time. > After a time, there's a cutoff and users are forced to change their > credentials the next time they log in. The old login has to be > supported as long as there are users who have not yet changed... or > until someone decides to toss those users. > > Barry >
- [vwrap] authentication : remove reference to MD5 Meadhbh Hamrick
- Re: [vwrap] authentication : remove reference to … Peter Saint-Andre
- Re: [vwrap] authentication : remove reference to … Richard Barnes
- Re: [vwrap] authentication : remove reference to … Meadhbh Hamrick
- Re: [vwrap] authentication : remove reference to … Meadhbh Hamrick
- Re: [vwrap] authentication : remove reference to … Barry Leiba
- Re: [vwrap] authentication : remove reference to … Meadhbh Hamrick
- Re: [vwrap] authentication : remove reference to … Meadhbh Hamrick
- Re: [vwrap] authentication : remove reference to … Patnad Babii
- Re: [vwrap] authentication : remove reference to … Meadhbh Hamrick
- Re: [vwrap] authentication : remove reference to … Sean Hennessee
- [vwrap] We need protocol negotiation to be builti… Carlo Wood
- Re: [vwrap] We need protocol negotiation to be bu… Sean Hennessee
- Re: [vwrap] We need protocol negotiation to be bu… Morgaine