David Wright schrieb am Wed, Apr 10, 2002 at 01:13:37AM -0700:
> 
> Since there is such as SASL love-fest going on here, allow me to chime 
> in with my dissenting viewpoint. SASL adds nothing but an annoying 
> dependency to LDAP. No, I take that back, it also adds a security hole.
> 
> Challenge-response mechanisms have absolutely no advantage over straight 
> password transmittion across an SSL/TLS encrypted line. In fact, if they 
> run in cleartext, they have a few disadvantages: (1) No server 
> certificate authentication. (2) If you watch challenge-response a few 
> times, you can get a good deal of the way toward decrypting the password.
> 
> Furthermore, in order to support multiple authentication mechanisms, 
> SASL must store password essentially in cleartext (i.e. not in a hased 
> form). That means if anyone ever gets access to your sasldb, you are 
> hosed. Not true for an LDAP database, stores passwords in hashed form.
> 
> The only advantage of a security layer is flexibility: allowing 
> authentication via arbitrary backeds (LDAP, SQL, passwd, shadow, 
> kerberos). While SASL makes this possible in theory, I have not had good 
> experiences in trying to make use of this flexibility -- there is very 
> little in the way of widely-distributed, well-tested, well-supported, 
> drop-in code to do all this stuff.
> 
> Finally, Birger, what's "really creative" about
> 
>   by self write
>   by anonymous auth
>   by * none
> 
> ?

I have absolutly no problem with that, do it myself somewhat similar. 

But what I acknowledge is that LDAP is not a framework for authentication
*mechanisms*, whatever those are/will be.  SASL is one.  On the other hand,
one has to see that SASL is not for storing user information (apart from
storing user passwords), LDAP is.  So how do we get these toys together 
if one 

 1. is going to protect user information based on "by self write" - you
    first have to see what "self" is! - and

 2. has, to faciliate 1., authenticate someone based on user information

which will always result in a request loop?  We simply don't.  At this 
point the separation of a

  user information database

and a 
 
  authentication mechanism framework

simply does not work because of overloaded interdependencies.  A solution?
I don't know exactly.  Either merge those two or find a workaround I guess.



Regards,

Birger

Reply via email to