Hi Joe, Sorry for the tardy reply....
I guess it depends on what you mean by "expose". If it means a kind of flashing-- here's the username and password!-- then no this is not sufficient. Such an exposure is certainly a problem but popular ways to get around this exposure are not satisfactory. What I'm saying is that Jeff Schiller's old maxim of "NO PLAINTEXT PASSWORDS!" is necessary but not sufficient. Password-derived data-- "I'll hash in the password and a couple of nonces so it's not a plaintext password anymore"-- also poses a problem. So to answer your question of whether any modification is needed, yes it is. Password-based authentication methods are flawed by definition because the attacker can always be wildly lucky and guess the password at any time-- whether the attack is on-line or off-line. Therefore the definition should say _exactly_ what kind of property is desired in a tunneled method that employs username and password for authentication. What needs to be said is that when using password-based authentication, each attack MUST NOT leak more than a single bit of information-- that single bit being whether a singular guess is correct or not. I suggest using the canonical definition of "dictionary attack" from the cryptographic literature: "The advantage any attacker gains against the tunneled method when employing a username and password for authentication MUST be through interaction and not computation". regards, Dan. On Thu, August 6, 2009 12:41 pm, Joseph Salowey (jsalowey) wrote: > Section 3.1 already states: > > " ... The tunnel method MUST support this use case. > However, it MUST NOT expose the username and password to parties in > the communication path between the peer and the EAP Server and it > MUST provide protection against man-in-the-middle and dictionary > attacks. The combination of the tunnel authentication and password > authentication MUST enable mutual authentication." > > Is there any modification necessary? > > Joe > >> -----Original Message----- >> From: Alan DeKok [mailto:al...@deployingradius.com] >> Sent: Thursday, August 06, 2009 1:00 PM >> To: Dan Harkins >> Cc: Joseph Salowey (jsalowey); emu@ietf.org >> Subject: Re: [Emu] Issue #7: Password Authentication >> >> Dan Harkins wrote: >> > Perhaps it would be a good idea to mandate that the >> method used to >> > authenticate the tunnel (outer method, whatever you want to call >> > it) MUST NOT be susceptible to a dictionary attack if it is >> going to >> > be used to transport a username and plaintext password to the >> > authentication server. >> >> That is reasonable. >> >> Alan DeKok. >> > _______________________________________________ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu