Issue 5911 - password policy - alternate lockout mechanism
Summary: password policy - alternate lockout mechanism
Status: VERIFIED FIXED
Alias: None
Product: OpenLDAP
Classification: Unclassified
Component: slapd (show other issues)
Version: 2.4.13
Hardware: All All
: --- normal
Target Milestone: ---
Assignee: OpenLDAP project
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2009-01-28 22:57 UTC by aravind@freeshell.org
Modified: 2014-08-01 21:04 UTC (History)
0 users

See Also:


Attachments

Note You need to log in before you can comment on or make changes to this issue.
Description aravind@freeshell.org 2009-01-28 22:57:10 UTC
Full_Name: Aravind Gottipati
Version: 2.4.13
OS: Linux - RHEL5
URL: ftp://ftp.openldap.org/incoming/
Submission from: (NULL) (63.245.220.241)


I'd like to propose a change to how the password lockouts work.  The current
system does not differentiate between multiple bind attempts with a single (or
even a few) incorrect password(s) vs. multiple bind attempts with different
incorrect passwords.  

In our case, this results in a ton of false positives when folks change their
password, but don't propagate their password change to all the
applications/machines that use it.  This causes a bunch of un-necessary
lockouts.  A real crack attempt on the other hand would most likely try a bunch
of passwords (none of which repeat).

I have posted the same on the openldap-software mailing lists and Jeff Clowser
proposed a scheme that should work to solve the problem.  

Record each failed bind attempt as a (hash,timestamp) pair.  If there is another
failed attempt, check the password against these (hash, timestamp) pairs and
update the timestamp if the hash is found.  If its a new password that hasn't
been attempted before, then create a new (hash,timestamp) pair.  Lock the
account out if there are more than pwdMaxFailure hashes stored.

http://www.openldap.org/lists/openldap-software/200901/msg00147.html

Comment 1 Kurt Zeilenga 2009-01-28 23:10:30 UTC
changed notes
Comment 2 Kurt Zeilenga 2009-01-28 23:10:59 UTC
changed notes
Comment 3 Howard Chu 2009-01-28 23:18:58 UTC
moved from Incoming to Software Enhancements
Comment 4 Howard Chu 2009-07-07 02:29:20 UTC
changed notes
changed state Open to Closed
Comment 5 OpenLDAP project 2014-08-01 21:04:53 UTC
From a security perspective, it is a really bad idea to failed passwords (or
even hashes of passwords) for 
an extended period of time (e.g., longer than the failed authentication
request).
A better approach would be to simply raise the number of allowed tries to that
far greater than the user 
is likely to try before seeking help.  This number is still low enough to stop
an automated brute for 
attack against a single account.