ad-assurance - [AD-Assurance] Resistance levels for AD/NTLM on replay/eavesdropper
Subject: Meeting the InCommon Assurance profile criteria using Active Directory
List archive
- From: "Capehart,Jeffrey D" <>
- To: "" <>
- Subject: [AD-Assurance] Resistance levels for AD/NTLM on replay/eavesdropper
- Date: Mon, 1 Apr 2013 14:26:37 +0000
- Accept-language: en-US
- Authentication-results: sfpop-ironport01.merit.edu; dkim=neutral (message not signed) header.i=none
Upcoming for Friday’s discussion on the matrix are:
Assuming protected channels are not being used and the NTLM hash, token, or secret is all we have to work with… For background, see the reference on “impractical” per NIST SP 800-63-1: (Dec. 2011) *“Impractical” is used here in the cryptographic sense of nearly impossible, that is there is always a small chance of success, but even the Attacker with vast resources will nearly always fail.
For off-line attacks, impractical means that the amount of work required to “break” the protocol is at least on the order of 280
cryptographic operations. For on-line attacks impractical means that the number of possible on-line trials is very small compared to the number of possible key or password values. OK time for some math! Now, 2 to the 80th power is a very large number, about 1.2 x 10^24, roughly a “million-billion-billion”. If “break the protocol” refers to deriving the user’s password from the NTLM hash, then the usual method is to try an exhaustive
brute-force going through all possible passwords, hashing, and checking for a match. Therefore, with a 95-character set for passwords, how long (N) would the password need to be such that 95^N is “at least on the order of 2^80”? Solving for N, the result is log(2^80)/log(95) = 12.17 which means either a 12 or 13 character length password. Technically, 12 characters yields only 2^78.8, but does that qualify per “at least on the order of” or would 13 be the minimum? So, think about if longer length meets the “resist eavesdropper”. Technically, that is supposed to work for Kerberos too? And the NTLMv2 is supposed to have a fine-grained time value to help resist replay. Check the matrix: LM - Does not resist replay attacks*
LM - Vulnerable to eavesdropping*
Think about alternative means, and any configurations that would meet the spec. One AM posted is to use a VPN for everything (to get the protected channel). We had also thought about replay for purely AD:DS sessions not being in-scope if Shibboleth/SAML2.0 was being used for the session with the Silver assertion. Consider NTLMv2 while reading the background on resisting replay from NIST SP 800-63-1:
•
Protocols that use nonces or challenges to prove the “freshness” of the transaction are resistant to replay attacks since the Verifier will easily detect that the old protocol messages replayed do
not contain the appropriate nonces or timeliness data related to the current authentication session.
Jeff Jeff Capehart, CISA |
- [AD-Assurance] Resistance levels for AD/NTLM on replay/eavesdropper, Capehart,Jeffrey D, 04/01/2013
- [AD-Assurance] RE: Resistance levels for AD/NTLM on replay/eavesdropper, Eric Goodman, 04/01/2013
Archive powered by MHonArc 2.6.16.