[4692] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: SecureID alternatives?

daemon@ATHENA.MIT.EDU (Dave Kristol)
Thu Mar 6 13:16:08 1997

Date: Thu, 06 Mar 1997 09:55:58 -0500
From: Dave Kristol <dmk@bell-labs.com>
To: Vin McLellan <vin@shore.net>
Cc: www-security@ns2.rutgers.edu
Errors-To: owner-www-security@ns2.rutgers.edu

Vin McLellan wrote:
> [discussing Digest Authentication and MiTM attacks...]
> 
>         I knew there are a number of MiTM attacks possible, but I didn't
> think actually replacing the entity digest (ie, spoofing the server) is one
> of them -- at least, not if it is known that the server uses DAA.  I
> thought the MiTM scams might try to erase the digest, or switch to basic,
> or screw with the headers to cause a Denial of Service, but I thought the
> message digest relatively secure.
> 
>         Actually, rfc 2069 seems to allow for an amazing number of
> alternative nonce and/or digest implementations (which, in any given
> environment, would have to be established by common expectations at both
> ends) so maybe I'm missing something.

It sounds like you're reading too much into the spec, or haven't read it at all.
DAA is meant to be a *more* (but certainly not *highly*) secure drop-in
replacement for Basic Authentication.

> 
>         In any case, if there is a prior (or out of band) distribution of,
> say, the server's secret -- which would be factored into the entity digest,
> as per 2069 -- then the digest would verify the integrity of the download
> absolutely.

The main use for the entity digest is to assure the integrity of the entity (and
remember it can be used either server->client or client->server).  It was never
meant to assure authenticity of the entity.  That's what SSL and S-HTTP are for.

> 
>         It did strike me that if the message (entity) digest had been
> designed to include the client's password (securely submitted to the server
> in the initial MD5 authentication exchange) it would be vastly more secure.
> OTOH, given that most of the implementations will require a prior agreement
> between all the participants on an acceptable format, why not just do a
> digital signature on the digest before it is transmitted from the server
> (or the client)?

Right now the degree of coordination between the client and server is a username
and password.  Indeed, because of the nature of the DAA challenge/response, the
server might not actually *know* the password (secret), only a hash of it and
other things.  So there might be *no* shared secret with which you can key a hash
in either direction.

> 
>         The content could still be read by the various national
> intelligence agencies (who now seem to determine which privacy technologies
> are accessible to everyone _except_ the crooks, the terrorists, and the
> infowar commandos) but the integrity of the "digested" message could be
> assured.  Come to think of it, I don't understand why a digital sig on the
> digest isn't an option in the rfc.  Anyone know?

That capability would be well beyond the intended aims of the RFC, namely drop-in
replacement for Basic.  This is from the Purpose section:

  The Digest Access Authentication scheme is not intended to be a
  complete answer to the need for security in the World Wide Web. This
  scheme provides no encryption of object content. The intent is simply
  to create a weak access authentication method which avoids the most
  serious flaws of Basic authentication.

Dave Kristol

home help back first fref pref prev next nref lref last post