[Date Prev][Date Next]
LDAP and DIGEST-MD5 SASL
I'm trying to implement DIGEST-MD5 in an LDAP front-end to an X500
I can't figure out what needs to be stored for credentials. Thanks to
OpenLDAP, I have an ldapsearch that does the first part of the bind
I have read RFC2829 and RFC2831 but find that I am at a loss to understand
how the very simple operation of authentication is performed.
>From RFC2829 section 6.1:
The server will respond with a bind response in which the resultCode
is either success, or an error indication.
I have no idea how this operation is performed. RFC2831 does not seem to
give a clue about this either. As near as I can tell, the LDAP server
is required to either use a separate file for authentication information
MD5hash( username-value ":" realm-value ":" passwd )
or store this information in the directory entry for the user that is
trying to authenticate. It is not clear which attribute this information
needs to be stored in or what access control is needed for this attribute.
The catch-22 comes from what I see as a very serious security violation
with any of the methods that can be used to implement this operation.
Since the user needs only the MD5hash value to authenticate, The MD5hash
value can be considered as a plaintext password. (3,9 in /rfc2831)
In order to do the DIGEST-MD5 calulation, this attribute needs to be able
to be read. This means that any administrator that has access to the
directory can read this password hash and use it to authenticate to the
directory as that user.
In an X500 situation, this attribute must be able to be read between two
DSAs. A snoop on the line will reveal this password hash, the same as
being able to read a cleartext password. At least with simple
the only thing passed between the DSAs is a compare operation.
I'm sure that I'm missing something very basic. With all the complexity
of the DIGEST-MD5 operation, I can't believe that it is so simple to
break the authentication operation.
David Cahlander David.A.Cahlander@syntegra.com 651-415-3171