[Date Prev][Date Next]
[Chronological]
[Thread]
[Top]
RE: proxy authentication
> -----Original Message-----
> From: owner-openldap-devel@OpenLDAP.org
> [mailto:owner-openldap-devel@OpenLDAP.org]On Behalf Of Kurt D. Zeilenga
> At 04:54 PM 2002-06-16, Luke Howard wrote:
>
> >>This is basically the same as passing through the SASL
> >>bind request/responses EXCEPT the authenticating server
> >>knows it [is] doing [it] for the middle box and hence can prepare
> >>a response which can be relayed to the end client.
> >
> >In what cases would this be necessary?
>
> Any mechanism with man-in-the-middle protection... e.g. DIGEST-MD5.
No part of the DIGEST-MD5 exchange is dependent on the individual machines
in the transaction. As such, DIGEST-MD5 has no man-in-the-middle protection.
Also see http://www.ietf.org/rfc/rfc2831.txt section 3.6 which states
Digest authentication is vulnerable to "man in the middle" (MITM)
attacks.
The only way to defend against this is to secure the channel between the
authenticating server and the proxy.
-- Howard Chu
Chief Architect, Symas Corp. Director, Highland Sun
http://www.symas.com http://highlandsun.com/hyc
Symas: Premier OpenSource Development and Support