|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] RE: DH-CHAP> POST to IP Storage working group > ---------------------------------- > Just had a look at DH-CHAP protocol. > Assume the following is the correct formulation of DH-CHAP. > Then I suspect it is not secure against active off-line dictionary > attacks. That is correct. DH-CHAP is not secure against active attacks, and is not intended to be secure against active attacks, just passive ones. Section 1 of the DH-CHAP draft says: DH-CHAP strengths CHAP in a fashion that requires an attacker to perform an online attack (which will generally lead to an authentication failure) in order to capture the information required to mount an off-line dictionary attack on each CHAP secret. The "(which will generally lead to an authentication failure)" text is incorrect and will be removed in the -01 version of the draft, as an impersonation attack against one-way authentication will not generally lead to an authentication failure. The impersonation attack that Yongge Wang describes is noted in Section 6.3 of the DH-CHAP draft which says that both CHAP and DH-CHAP Initiators are vulnerable to both impersonation and man-in-the-middle attacks. [... details of impersonation attack snipped ...] > If you have any interest in revising DH-CHAP to get a secure version, > I may spend some time to help you on this matter... Thanks, but resistance to this sort of active attack is not a design goal of DH-CHAP. I would have hoped this was clear from the first paragraph of Section 1, but I could add a sentence to make this explicit if that would improve the clarity of the draft. Thanks, --David --------------------------------------------------- David L. Black, Senior Technologist EMC Corporation, 42 South St., Hopkinton, MA 01748 +1 (508) 249-6449 *NEW* FAX: +1 (508) 497-8500 black_david@emc.com Cell: +1 (978) 394-7754 ---------------------------------------------------
Home Last updated: Fri Apr 12 12:18:20 2002 9631 messages in chronological order |