SCRAM in LDAP
Better Password-based Authentication Kurt Zeilenga Isode Limited
SCRAM in LDAP Better Password-based Authentication Kurt Zeilenga - - PowerPoint PPT Presentation
SCRAM in LDAP Better Password-based Authentication Kurt Zeilenga Isode Limited What is SCRAM? S alted C hallenge R esponse A uthentication M echanism SCRAM-SHA-1-PLUS An improved SASL mechanism for password authentication of the
SCRAM in LDAP
Better Password-based Authentication Kurt Zeilenga Isode Limited
Authentication Mechanism
password authentication of the user.
Internet and Enterprise networks.
authentication in LDAP
clear) without any confidentiality protection and without authentication of the server.
protect passwords during LDAP Simple Bind, as well as protect subsequent data exchange.
verification of server X.509 certificate, server verification not commonly performed in early years.
to LDAP in 1997.
time included PLAIN and CRAM-MD5.
in LDAP , and generally not used in LDAP .
during exchange.
SSL to protect passwords.
but protect all LDAP data. Hence, CRAM- MD5 did not offer much value.
CRAM-MD5 and to provide compatibility with HTTP Digest.
rarely properly implemented, rarely used.
protection, but wasn’t well implemented and is not widely deployed.
is a password equivalent.
mechanisms and operating system login mechanism (e.g., crypt(3))
, including introduction of the Start TLS
mandatory-to-implement requirement.
Simple Bind (server authentication, confidentiality protection).
know where the user entry is, or where the password is, or how it’s to be prepared for storage, etc.
, now broadly implemented (but not ubiquitous).
to hold hashed user passwords
names and passwords
authentication mechanism changed to StartTLS+Simple w/ DN & Password
(startTLS or ldaps://) is ubiquitous.
well but often not used or used improperly.
(often required), commonly newer RFC 2307 schemes such as Salted SHA1 or even Salted SHA2.
authenticating the server.
elsewhere.
implements server authentication AND it’s properly used. Bad assumptions (especially the latter).
sent is not reusable.
a response that demonstrates it knowledge
server is not sufficient to impersonate the user, and is salted.
internationalization)
implements server authentication AND it’s properly used. Bad assumptions (especially the latter).
man-in-middle.
entity is also in control of the server TLS end-point.
server entity is also in control of the client TLS end-point.
TLS SASL LDAP
Client Server
TCP
TCP TLS SASL LDAP
Client Server
T C P
Relay
TCP TLS SASL LDAP
Client Server
TCP
Relay
TLS
TCP TLS SASL LDAP
Client Server
TCP
Relay
TLS SASL LDAP
TCP TLS SASL LDAP
Client Server
TCP
MITM
TLS
TLS SASL LDAP
Client Server
TCP
TCP TLS SASL LDAP
Client Server
TCP
MITM
TLS
TCP TLS SASL LDAP
Client Server
T C P
Relay
whitepapers/scram.html