[Freeipa-devel] LDAP TLS issues
Simo Sorce
ssorce at redhat.com
Sat Nov 10 20:07:15 UTC 2007
On Fri, 2007-11-09 at 18:20 -0500, John Dennis wrote:
> Simo Sorce wrote:
> > On Fri, 2007-11-09 at 17:09 -0500, John Dennis wrote:
> >
> > SASL/GSSAPI already provides (strong) encryption, you shouldn't need
> > TLS.
> > It's either/or
>
> I thought, but perhaps I was wrong, with SASL establishing encrypted
> transport was optional and independent of the auth mech. Or is it the
> case with GSSAPI encrypted transport the default is to always use
> encrypted transport? Or am I wrong that the use of encrypted transport
> is is a configurable property in SASL?
We enforce encryption to accept a connection, so we should be ok.
> > Anyway, why would you need to encrypt something in directory server?
> > When you search these attributes you will get them back in clear, the
> > encryption is useful only to protect the data in case someone steals the
> > disk and even then only if the secret is manually entered at start-up I
> > believe ...
> >
> > Care to elaborate more?
>
> Sure, I think you missed last Wednesday meeting. I'm storing radius
> client information in LDAP. One of those attributes is a secret shared
> between the NAS and Radius server. The Radius server must have plaintext
> access to the secret. The secret will be protected by ACL's, however
> it was felt the additional step of encrypting that attribute in the
> database was prudent.
>
> The secret is best thought of as an encryption key used to encrypt parts
> of the network communication between a radius client and the radius
> server. The secret is NOT a user password. Each NAS has it's own secret.
> If the secret were compromised it would be possible to decrypt sniffed
> radius protocol and possibly gain access to user passwords used in the
> radius protocol.
>
> In a conventional freeRADIUS installation the client data is store in a
> flat file protected by standard UNIX DAC. If the IPA server machine were
> root compromised that flat file could be read, the same is true of the
> LDAP database which in our case is also holding those secrets. However,
> if the LDAP database encrypted those attributes it would be one extra
> layer of protection. I believe the LDAP encryption key is stored on the
> server as well, so I suppose if the machine were root compromised it
> wouldn't be any worse than having the secrets in a flat file, but the
> hassle factor of getting the LDAP encryption key and decrypting the
> database may be more than the low hanging fruit a typical attacker is
> willing to invest in.
Ok on this premise I will probably also encrypt the kerberos Master
password that will be hold in the krbMKey attribute on the kerberos
container (currently only on a file on disk).
More information about the Freeipa-devel
mailing list