[39727] in bugtraq

home help back first fref pref prev next nref lref last post

Re: NTLM HTTP Authentication is insecure by design - a new writeup by Amit Klein

daemon@ATHENA.MIT.EDU (3APA3A)
Tue Jul 19 14:28:55 2005

Date: Tue, 19 Jul 2005 13:35:36 +0400
From: 3APA3A <3APA3A@SECURITY.NNOV.RU>
Reply-To: 3APA3A <3APA3A@SECURITY.NNOV.RU>
Message-ID: <1437166682.20050719133536@SECURITY.NNOV.RU>
To: "Amit Klein (AKsecurity)" <aksecurity@hotpop.com>
Cc: bugTraq <bugtraq@securityfocus.com>
In-Reply-To: <42DC05B0.3912.206A66@localhost>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit

Dear Amit Klein (AKsecurity),



--Monday, July 18, 2005, 9:40:32 PM, you wrote to bugtraq@securityfocus.com:

AKA>                      NTLM HTTP Authentication
AKA>               (and possibly other connection-oriented
AKA>           HTTP authentication and authorization protocols)
AKA>                       is insecure by design

 NTLM  authentication is insecure by design for external authentication,
 because  of  "single  signon" ideology. NTLM authentication can be used
 for  NTLM  proxy  attack. For example, attacker who can hijack or spoof
 server  connection  with NTLM authentication can use this connection to
 access  different  Web server, mail server or file server with client's
 credentials.  This  is  known for many years and was discussed for many
 times.  Few  years  ago  Internet  Explorer  was  patched  to  use NTLM
 authentication  only  for  local  network zone. Local network are hosts
 with  NetBIOS name (for example WEBSRV, excluded by default from proxy)
 and list of proxy exclusions.

 So,  under default configuration, NTLM will not be used through proxy
 server, at least in Internet Explorer.

-- 
~/ZARAZA
http://www.security.nnov.ru/


home help back first fref pref prev next nref lref last post