Re: [vwrap] authentication : remove reference to MD5

Meadhbh Hamrick <ohmeadhbh@gmail.com> Tue, 06 April 2010 22:01 UTC

Return-Path: <ohmeadhbh@gmail.com>
X-Original-To: vwrap@core3.amsl.com
Delivered-To: vwrap@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 329333A699A for <vwrap@core3.amsl.com>; Tue, 6 Apr 2010 15:01:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.481
X-Spam-Level:
X-Spam-Status: No, score=-2.481 tagged_above=-999 required=5 tests=[AWL=0.118, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Zzs9tczTfMCM for <vwrap@core3.amsl.com>; Tue, 6 Apr 2010 15:01:50 -0700 (PDT)
Received: from mail-qy0-f181.google.com (mail-qy0-f181.google.com [209.85.221.181]) by core3.amsl.com (Postfix) with ESMTP id E027F3A68A5 for <vwrap@ietf.org>; Tue, 6 Apr 2010 15:01:43 -0700 (PDT)
Received: by qyk11 with SMTP id 11so393348qyk.13 for <vwrap@ietf.org>; Tue, 06 Apr 2010 15:01:38 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :from:date:received:message-id:subject:to:content-type :content-transfer-encoding; bh=Bg4M/Mf5h24ZaVNctX8N7lkfVxEIzBNUJftOSYwzAl4=; b=tjeX4fd7VadrRqHOWJvotLDw40oolCwcN0vHzpHMM4CSBB51lRc2sSfJMRq4Gcrrdk VCdrdEiKtPUO5l8K/HeiZV2794NY81elWgy3YUttRRIdTv4v2wzWlbKNVCDvm7LD14pN MUahlYnx8v8GSw/F1n6R4B1XNy23ctAyT7DBI=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :content-type:content-transfer-encoding; b=ccuR1qQRIBz63WbgfxNNFUeL3/VohrDM0t8ilZkLrmBbie5eoYmkkLcaH9R9K1ei6E HVg/ow4TYpXM+gM4GF+Md0mX0bxsYVOgc0ispaQMfpBYmi2028e+e6UB7xpWvCAjJqEy v1ySmGbty0fiaLR33ozzSLQ/X0PULAetBpvuk=
MIME-Version: 1.0
Received: by 10.229.247.72 with HTTP; Tue, 6 Apr 2010 15:01:18 -0700 (PDT)
In-Reply-To: <r2j6c9fcc2a1004061425w7efff62fu7d6647048a6d92d3@mail.gmail.com>
References: <v2zb325928b1004060719nadbc4f76h1be1c4463578fc4a@mail.gmail.com> <4BBB7705.4060206@stpeter.im> <u2vb325928b1004061122u36b2d85cs2a243f2de9231505@mail.gmail.com> <r2j6c9fcc2a1004061425w7efff62fu7d6647048a6d92d3@mail.gmail.com>
From: Meadhbh Hamrick <ohmeadhbh@gmail.com>
Date: Tue, 6 Apr 2010 15:01:18 -0700
Received: by 10.229.241.66 with SMTP id ld2mr1233399qcb.78.1270591298173; Tue, 06 Apr 2010 15:01:38 -0700 (PDT)
Message-ID: <v2nb325928b1004061501xd6e9902an582dbdbcf16c6b83@mail.gmail.com>
To: Barry Leiba <barryleiba@computer.org>, vwrap@ietf.org
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Subject: Re: [vwrap] authentication : remove reference to MD5
X-BeenThere: vwrap@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Virtual World Region Agent Protocol - IETF working group <vwrap.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/vwrap>, <mailto:vwrap-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/vwrap>
List-Post: <mailto:vwrap@ietf.org>
List-Help: <mailto:vwrap-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/vwrap>, <mailto:vwrap-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 06 Apr 2010 22:01:51 -0000

yes. but until the migration is complete for all users, do we
implement the new spec with SHA256? do well tell users they have until
a certain date to login and regenerate the hash?

it would be nice if we could have SOME reverse compatibility so we
could use the maintenance facility to do the rehashing. so you could:

1. on a certain date, stop returning seed caps from a successful login
with MD5, but include a maintenance cap with an URL pointing to a page
users can use to rehash their password.

2. at the web page, users re-enter their password, it's hashed with
SHA256 and it's stored in the database.

3. the next time that user logs in, they hash their password with
SHA256 instead of MD5 and avoid having to go through the process
again.

4. at some point in the future, you disable logins for people with
only MD5 hashed passwords (maybe).

what we would need to make this work would be:

a. a way to log in with MD5 until you can use VWRAP to carry the
SHA256 password.

b. a way to figure out which hashed password to send (MD5 or SHA256).

in the case of second life, you probably COULD get away with using MD5
with the legacy protocol. i can't remember if the current legacy
protocol supports maintenance caps. if it does you could use a
maintenance cap. if not, you simply fail and wait for the user to call
the support line. this would be pretty costly, but if we really want
to avoid legacy in the new protocol, we're probably going to see a
number of issues like this.

if we had just enough legacy in the new protocol to support MD5, we
could use the maintenance capability as described above. if we added a
return value from the auth request that had the meaning of
"unsupported algorithm" the client would know to retry the MD5 request
with SHA256.

just my $0.02.

-cheers
-meadhbh
--
meadhbh hamrick * it's pronounced "maeve"
@OhMeadhbh * http://meadhbh.org/ * OhMeadhbh@gmail.com



On Tue, Apr 6, 2010 at 2:25 PM, Barry Leiba
<barryleiba.mailing.lists@gmail.com> wrote:
>> so if we simply said "we're going to ditch MD5 in favor of SHA256"
>> there would be a problem with reverse compatibility of the
>> authentication data. this is because you can't generate the pre-image
>> from an MD5 MIC and then use it to generate a SHA256 MIC. (or you
>> can't do that in a way that insures that your MD5 pre image is the
>> same as the password.)
>
> The usual way to handle this is with a migration process.  Credentials
> are re-hashed with the new algorithm when they're changed, over time.
> After a time, there's a cutoff and users are forced to change their
> credentials the next time they log in.  The old login has to be
> supported as long as there are users who have not yet changed... or
> until someone decides to toss those users.
>
> Barry
>