[Date Prev][Date Next] [Chronological] [Thread] [Top]

Re: Server side delay for bad passwords?



On Thursday 07 February 2008 21:37:20 Dan White wrote:

> I'd only want a delay when a user/attacker has entered a bad
> password, similar to the way a UNIX shell introduces a delay.

The UNIX shell (well actually, the login binary on my UNIX clone OS, which 
uses PAM) doesn't introduce a delay for a bad password, but under any 
circumstance where the credentials supplied are incorrect.

Implementing it only for when the password is incorrect is typically 
discouraged by security researchers, as this is information disclosure (which 
could assist an attacker in gathering information for performing an attack). 
For example, a few years back, OpenSSH specifically added a patch to ensure 
that when OpenSSH authenticated via PAM, that the delay would be exactly the 
same whether the user existed or not.

Now, if you really want to introduce a long delay when any bind fails, I think 
you will experience problems.

> My 
> concern is that the faster I tune my server, the more likely it
> will become that an attacker will brute force a password.

IMHO, you should rather ensure that entering the incorrect password more than 
a specified number of times results in the account being locked out. If your 
SASL mechanism can't do this, take that to their list. 

> > Don't know, but the manpage doesn't mention "simple", only "bind".
>
> I've seen mention on the list before that ppolicy does not apply
> to SASL binds, and that's been my experience in testing as well.

Naturally, as the p in ppolicy is for password, in the SASL case, the LDAP 
server doesn't have the password (in most cases). However, for the simple 
bind case, I would use ppolicy with lockout.

But then, I authenticate 200 users/second, and I can't tolerate delays or more 
connection build-up.

Regards,
Buchan