[13573] in bugtraq

home help back first fref pref prev next nref lref last post

Re: S/Key & OPIE Database Vulnerability

daemon@ATHENA.MIT.EDU (Mudge)
Wed Jan 26 13:48:02 2000

Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-Id:  <Pine.BSO.4.21.0001251609270.26757-100000@0nus.l0pht.com>
Date:         Tue, 25 Jan 2000 16:11:46 -0500
Reply-To: Mudge <mudge@L0PHT.COM>
From: Mudge <mudge@L0PHT.COM>
X-To:         Steve VanDevender <stevev@hexadecimal.uoregon.edu>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <14478.4795.166871.553168@hexadecimal.uoregon.edu>

Theoretically I agree whole heartedly.

In practice we were engaged in an audit and would not have been succesful
without the seed (I appologize for my terminology but I look at the
decrementing counter as the counter and the fixed value for the iterations
as the seed here).

People need to learn from both the theoretical and the practical - neither
work in a vacuum.

cheers,

.mudge

On Tue, 25 Jan 2000, Steve VanDevender wrote:

> Mudge writes:
>  > Ahhh but here was my concern back in 95/96 which appears to still be
>  > valid:
>  >
>  > Given that you know what machine you are connecting to, the use of the
>  > seed in the S/key challenge is not as necessary to present to the end user
>  > as it might be otherwise.
>  >
>  > Thus - server: abc123 challenge: s/key 99 K113356
>  >
>  > could be reduced to server: abc123 challenge: s/key 99 as presented to the
>  > user. This would make the current dictionary attacks largely unusable as
>  > there is a secret that is required but unknown to the attacker.
>
> The point of having the seed (or challenge word, as I referred to it
> previously) in the challenge is that when the sequence number in the
> challenge becomes low, one can start a new sequence using a different
> seed without the user having to change his S/Key secret.  The rationale
> is quite clearly described in the RFC.  The seed is not anything like a
> secret and was never intended to identify the server being connected to,
> and removing it is not beneficial to the S/Key protocol.  Removing the
> seed does not make dictionary attacks on the user's secret harder, let
> alone "largely unusable".  At best it might force the user to choose
> different secrets once in a while to restart their sequences, but if the
> user is already inclined to use poor secrets, it's still not improving
> security significantly.
>
> Ultimately the security of S/Key depends on whether the user's secret
> remains secret.  The choice of a good secret that is not susceptible to
> a dictionary attack, then defending the secret against exposure, is the
> only real way to ensure S/Key's security.
>

home help back first fref pref prev next nref lref last post