[Date Prev][Date Next] [Chronological] [Thread] [Top]

Re: Authentication Methods for LDAP - last call



Comments inline.

regards,
John

At 06:15 PM 8/3/98 -0700, Chris Newman wrote:
>On Sat, 1 Aug 1998, Steve Kille wrote:
>> I am totally opposed to mandatory support of CRAM-MD5 in 
>> LDAP.   CRAM-MD5 requires a shared secret between client 
>> and server.  In a large scale distributed system, where a 
>> given client might bind to many servers, this is totally 
>> unmagageable.   I think that the policy documents should 
>> NOT be requiring this.  I cannot overstate how BAD I think 
>> this choice is?
>
>I've been studying the mandatory-to-implement authentication mechanism
>problem for over a year (see draft-newman-auth-mandatory-00.txt for a 
>problem statement), so I have a strong opinion in this area.  Let me
>start by observing the following:
>
>* The IESG requires that if a random update-capable client and a random
>read/write capable server are selected, there will be a way to configure
>them to authenticate using something better than unencrypted clear text
>passwords.  While this is a harsh requirement, it is not unreasonable.
>Experience demonstrates that if no mandatory-to-implement mechanism is
>defined, then the real-world mandatory-to-implement mechanism is
>unencrypted clear text passwords.  This is true of POP3, LDAP and IMAP 
>today.
>
>* Scalability comes in two forms -- many users on one server or many
>servers with distributed rules

[js] umm, excuse me, but there is a huge difference between the relatively
small number of users that a single server can support and the very large
number of users that a distributed system consisting of multiple servers
can support.

>* CRAM-MD5 is several orders of magnitude faster than X.509.

[js] shooting yourself in the head will probably make you die faster than
shooting yourself multiple times in the foot - what's the point? if the
requirement is scalability and/or being able to support large numbers of
users for secure authentication, CRAM-MD5 won't cut it. period.

>* CRAM-MD5 scales better for many users on one server than X.509

[js] see above.

>* X.509 scales better for a distributed system than CRAM-MD5
>
>* CRAM-MD5 is a small burden on an implementor, X.509 is a huge burden

[js] but undertaking security for a distributed system is a huge burden in
and of itself. taking short cuts doesn't make this easier.

>CRAM-MD5 is the right choice today for the mandatory-to-implement
>mechanism in LDAP.  It has good enough properties and scalability for
>single-server deployments.  It is not hard to implement.  There is, of
>course, no requirement to use the mandatory-to-implement mechanism or even
>to have it on by default as long as it can be turned on. 

[js] sorry, i disagree. single-server deployments does not equal large
deployments. and even your wording seems like you're trying to make excuses
to justify the limitations of CRAM-MD5. "easier to implement" and "faster
in performance" and "good enough properties for single-server deployments"
are not good reasons to saddle LDAP (or any other protocol that wants to
work in the Internet) with this.

>I happen to think that TLS-protected clear text passwords make a good
>SHOULD implement feature -- as they provide backwards compatibility with
>legacy authentication sources such as NTLM or /etc/passwd -- an issue that
>Mark Smith pointed out.
>
>Implementations SHOULD NOT use unprotected clear text passwords.  That's a
>recommendation most will ignore for practical reasons, but it causes
>sufficient harm that the recommendation is important.
>
>I believe the current draft is realistic and pragmatic.  Unless someone
>else can make a compelling argument for a different mandatory-to-implement
>standards-track mechanism, CRAM-MD5 is the best choice today.
>
>		- Chris

[js] I think that this needs further discussion. Kerberos, for one, seems
to be a better choice.