CURRENT_MEETING_REPORT_



Reported by Jeffrey Schiller/MIT

PASSEC Minutes

The Password and Configuration Management Working Group met for the
first time in Boulder.

Agenda

The Working Group has two distinct goals:

   o First - To make computer systems more resistant to unauthorized
     access by defining and/or improving the management of their user
     passwords and configurations.
   o Second - To prevent the transmittal of clear-text passwords over
     the network by defining a protocol/algorithm that while allowing
     use of remote terminal servers would preclude retrieval of any
     information which might facilitate unauthorized access.

On Configuration and Password Management:

The group engaged in a lively discussion of the issues related to
password configuration management.  Specifically:


   o How to get users to choose ``good'' passwords.
   o How to get users to configure their systems to make them more
     resistant to outside tampering.
   o Responsibilities:  User vs.  Vendor vs.  Network Manager


No conclusions were reached by the group.  The issues considered have
been more or less discussed in the Site Security Policy Handbook which
is being prepared by another Working Group.  This work is probably best
continued within that forum.  I recommend that no further meetings of
this group deal with these issues.

On Password Protection:

It was felt that this problem is secondary to the password configuration

                                   1






problem mentioned above.  However there is a real concern today that
users of remote terminal servers invariably use them by sending their
clear-text password over the network from remote terminal server to home
system.  Given the size of the network and diversity of its management,
it is prudent at this time to develop a method for more secure
authentication from terminal server to host system.

Three proposals were discussed.  In general, proposals fall into two
categories.  Those that exchange encryption keys as part of the
protocol, and those that do not.  The methods that exchange keys are
cryptographically based, typically based on public key cryptography or
on a variant of Needham-Schroeder trusted third party symmetric key
exchange (for example Kerberos).  The methods that do not exchange
encryption keys typically involve the use of ``one-time'' passwords.  It
is desirable for all methods to not store plain-text information on
hosts that if compromised will permit unauthorized access (i.e., no
plain text passwords should be stored on host systems).

At the meeting three methods were discussed.  The first two methods are
one-time passwords schemes.  They are:


   o A method developed by Phil Karn which involves taking an initial
     password and encrypting N times (via the UNIX ``crypt(3)''
     function, which is a one-way trap-door function based on DES) and
     storing the result.  When a user wishes to login, the host system
     hands the number N over to the user.  The user then takes the
     initial password and encrypts it (via crypt(3)) N-1 times (either
     on a smart-card, portable PC or with computational resources on the
     terminal server) and sends the result over the network.  The host
     then computes the last round of encryption and compares the result
     with the stored value.  If they match then access is granted and
     the N-1 encryption is stored.  When N reaches 0, a new password
     needs to be chosen and stored.
   o A method developed by Chuck Hedrick uses an algorithm to convert a
     password into a DES key.  Initially the host system stores two
     values, the first is a random number one-way hashed (say via
     crypt(3)) and the second is the same random number encrypted in the
     DES key describe above.  When a user wishes to login, the DES
     encrypted version of the random number is sent to the user.  Using
     a smart-card, portable PC or terminal server software the user
     decrypts the number with the DES key and sends the plain text
     random number to the host.  The host one-way encrypts the supplied
     value and compares it with the stored one-way hashed value.  If it
     is the same, access is granted.  Once access is granted a new
     random number is chosen by the user (on the smart card or whatever)
     and a one-way hash is computed as well as the encrypted value
     (encrypted with the DES key).  These two values are then sent to
     the host to be stored for the next login authentication dialog.


                                   2






     Note:  In both of the above mechanisms it is possible to
     pre-compute the input that the user needs to enter, so as to avoid
     the need for specialized terminal server software, smart cards or
     the like.  The above methods do not perform key exchange, and are
     ``one-shot'' authentication schemes (i.e., they do not prevent the
     hijacking of the already created TCP connection).  Nor is data
     (both keyboard input and screen displays) protected from disclosure
     to unauthorized network eavesdroppers.


The third method mentioned at the meeting, introduced by Jeff Schiller,
is a key exchange protocol based on public key encryption and the
certificates that will be issued for Privacy Enhanced Mail.


   o The basic idea is for the user to choose a password which is then
     converted, via an algorithm, into an RSA private key/public key
     pair.  The public key is then digitally signed with the user's
     Privacy Enhanced Mail private key and the resulting signed value
     stored on the host.  To login the user informs the host of his/her
     intention to login.  The host then chooses a random DES key and
     encrypts it with the stored public key of the user.  This
     information is then forwarded to the user along with a randomly
     chosen number.  The user (via software in the terminal server,
     smart card, etc.)  then decrypts the DES key (using their private
     RSA key which is derived from a typed password).  The DES key is
     then used to encrypt the random number provided by the host and
     sends the result back to the host.  The host (which still knows the
     DES key) validates that the value returned is correct (i.e., the
     user demonstrated that he/she was able to obtain the DES key which
     was provided to them encrypted in their public key) and if it is,
     allows access.
     The above mechanism provides for secure key exchange (both the user
     and the host have exclusive knowledge of a DES key when the
     protocol is finished).  This key can then be used to encrypt data
     on the network, or to answer periodic ``challenges'' from the host
     (which would make it harder to hijack a TCP connection, even if
     each packet isn't encrypted).  The major drawbacks are that it
     requires the cooperation of the local terminal server, or a smart
     card (or portable PC). Licensing of some variety will be required
     as well.



There are other potential mechanisms in addition to those mentioned
above, the list was not meant to be exhaustive.  It is what we
discussed.


Attendees

                                   3






Vikas Aggarwal           vikas@JVNC.net
Karl Auerbach            karl@eng.sun.com
Ronald Broersma          ron@nosc.mil
Philip Budne             phil@shiva.com
Ken Carlberg             carlberg@sparta.com
Vinton Cerf              vcerf@NRI.Reston.VA.US
George Conant            geconant@eng.zyplex.com
Steve Crocker            crocker@tis.com
James Dray               dray@st1.ncsl.nist.gov
Fred Engel
Peter Ford               peter@lanl.gov
Harley Frazee            harley@t3plus.com
James Galvin             galvin@tis.com
Joel Jacobs              jdj@mitre.org
Philip Karn              karn@thumper.bellcore.com
Tom Kessler              kessler@sun.com
Christopher Kolb         kolb@psi.com
Walter Lazear            lazear@gateway.mitre.org
John Linn                linn@zendia.enet.dec.com
Carl Malamud             carl@malamud.com
Jim Reinstedler          jimr@ub.com
Bill Rust                wjr@ftp.com
Jeffrey Schiller         jis@mit.edu
Sam Sjogren              sjogren@tgv.com
Mark Stein               marks@eng.sun.com
Bob Stewart              rlstewart@eng.xyplex.com
Ron Strich               ssds!rons@uunet.uu.net
Kannan Varadhan          kannan@oar.net
Jesse Walker             walker@eider.enet@decpa.dec.com
Peter Wiedemann          wiedemann@dockmaster
C. Philip Wood           cpw@lanl.gov
Robert Woodburn          woody@sparta.com



                                   4