IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: gss userauth



>>>>> "Love" == Love  <lha%stacken.kth.se@localhost> writes:

    Love> Sam Hartman <hartmans%mit.edu@localhost> writes:

    >> The mechanism does as good of a job as it can for such cases.
    >> In such cases, GSSAPI tokens are like one-time passwords.  We
    >> know that if an attacker manages to tunnel them or otherwise
    >> get ahold of the token before the token reaches the server (and
    >> the server's replay cache), then the token can be used by the
    >> attacker.

    Love> It could do better if it did channel bindings with session
    Love> identifier in application data using GSS_C_AF_NULLADDRs.

    Love> Then gss mechs without integrity support but with (in gss
    Love> spec optional) channel binding support would not be
    Love> vulnerable to tunneling.

It could do that.  I wonder if it would work.  I am sufficiently
uncomfortable with GSS channel bindings to refrain from recommending
their use until CCM becomes much more mature.

Right now, I think that depending on channel bindings would delay our
solution.  If we believe we want to break backward compatability, I'd
rather choose one of the other approaches.




Home | Main Index | Thread Index | Old Index