go to  ForumEasy.com   
LdapPro
Home » Archive » Message


[Email To Friend][View in Live Context][prev topic « prev post | next post » next topic]
  Scenarios Where DIGEST-MD5 Works or NOT Work -- SunONE:
 
Subject: Scenarios Where DIGEST-MD5 Works or NOT Work -- SunONE:
Author: SteveHB
In response to: When and Why DIGEST-MD5 Authentication Does Not Work?
Posted on: 06/30/2006 07:51:29 PM

Basic Settings
---------------
Server: SunONE
Client: JNDI application
User: cn=testuser,cn=users,dc=mydomain,dc=com
Passwd: secret *[see note below]

The following settings works

    env.put(Context.SECURITY_AUTHENTICATION, "DIGEST-MD5");
    env.put(Context.SECURITY_PRINCIPAL, "u:testuser"); 


The following settings works
    env.put(Context.SECURITY_AUTHENTICATION, "DIGEST-MD5");
    env.put(Context.SECURITY_PRINCIPAL, 
                "dn:cn=testuser,cn=users,dc=mydomain,dc=com"); 


The following settings dose NOT work
    env.put(Context.SECURITY_AUTHENTICATION, "DIGEST-MD5");
    env.put(Context.SECURITY_PRINCIPAL, "u:testuser"); 
    env.put("javax.security.sasl.qop", "auth-int");


The following settings dose NOT work
    env.put(Context.SECURITY_AUTHENTICATION, "DIGEST-MD5");
    env.put(Context.SECURITY_PRINCIPAL, "u:testuser"); 
    env.put("javax.security.sasl.qop", "auth-conf");


Conclusions:
  • For SunONE to work with DIGEST-MD5, client's password must be stored in clear text. Ouch, this really sucks and I don't think any administartor want to risk that much to simply support MD5.
  • SunONE dose not support message integrity and confidentiality protection yet.

    Note: (here is what java.sun.com says for itself)
    "The SunONE Directory Server, v5 supports the Digest-MD5 authentication mechanism for users that have clear-text passwords. You must set the password encryption mode before you create the user. If you have already created the user, delete it and recreate it. To set the password encryption mode using the Administration Console, select the Configuration tab and the Data node. In the Passwords pane, select the "No encryption (CLEAR)" option for "Password encryption." The server accepts simple user names (that is, the value of the "uid" attribute for entries that have one) and the "dn:" format of user names. See the server's documentation for detailed information"



     

    > On 06/30/2006 07:03:52 PM SteveHB wrote:

    The Digest-MD5 mechanism is described in RFC 2831. In Digest-MD5, the LDAP server sends data that includes various authentication options that it is willing to support plus a special token to the LDAP client. The client responds by sending an encrypted response that indicates the authentication options that it has selected. The response is encrypted in such a way that proves that the client knows its password. The LDAP server then verifies the client's response.

    As it can be seen, the major advantages of DIGEST-MD5 are:
    1) prevent user password being sent across the Internet via clear text;
    2) provide message integrity and confidentiality protection, after authentication

    Apparently, the disadvantages are not trivial:
    Digest authentication requires that the authenticating agent (usually the server) store some data derived from the user's password in certain forms to be able to retrieve the value of:
        H({ username-value,":", realm-value, ":", passwd }). 
    

    without directly exposing the user's password. This is the source of why DIGEST-MD5 does not work for a lot of cases. (discussed later)


    The following example shows how a client performs authentication using Digest-MD5 to an LDAP server.

    /**
     * 
     * SaslDigestMD5JndiClient.java
     * Sample code to explore how and when DIGEST-MD5 authentication works.
     * 
     */
     
    import java.util.Hashtable;
    import javax.naming.directory.*;
    import javax.naming.*;
     
    public class SaslDigestMD5JndiClient
    {
        public static void main (String[] args)
        {
            String bind_dn       = "testuser";
            String bind_password = "secret";
            String init_url      = "ldap://myserver.mydomain.com:389";
        
            Hashtable env = new Hashtable();
            env.put(Context.INITIAL_CONTEXT_FACTORY,"com.sun.jndi.ldap.LdapCtxFactory");
            env.put(Context.PROVIDER_URL, init_url);
            
            // Set the authentication mechanism to be DIGEST-MD5
            env.put(Context.SECURITY_AUTHENTICATION, "DIGEST-MD5");
            env.put(Context.SECURITY_PRINCIPAL, bind_dn);
            env.put(Context.SECURITY_CREDENTIALS, bind_password);
            /*
             * other environment properties are: 
             * javax.security.sasl.qop:  
             *    specifies list of qops:  "auth", "auth-int", "auth-conf"
             *    auth      -- authentication only;
             *    auth-int  -- authentication & subsequent message's integrity check
             *    auth-conf -- authentication & subsequent message's 
             *                 confidentiality enforcement
             *    default is "auth" 
             *    env.put("javax.security.sasl.qop", "auth");
             * javax.security.sasl.strength 
             *    specifies low/medium/high strength of encryption; 
             *    default is all available ciphers [high,medium,low]; 
             *    high means des3 or rc4 (128); medium des or rc4-56; low is rc4-40. 
             *    env.put("javax.security.sasl.strength","high");
             * javax.security.sasl.maxbuf 
             *    specifies max receive buf size; default is 65536 
             * javax.security.sasl.sendmaxbuffer 
             *    specifies max send buf size; default is 65536 
             */
            
            DirContext ctx = null;
            try {
                // Create the initial directory context
                ctx = new InitialDirContext(env);
            } catch (Exception e) {
                System.err.println("Authentication failed: " + e);
            }
            
            try{
                
                // Create the search controls         
                SearchControls searchCtls = new SearchControls();
                
                //Specify the attributes to return
                String returnedAtts[]={"sn","givenName","mail"};
                searchCtls.setReturningAttributes(returnedAtts);
                
                //Specify the search scope
                searchCtls.setSearchScope(SearchControls.SUBTREE_SCOPE);
     
                //specify the LDAP search filter
                String searchFilter = "(&(objectClass=user)(mail=*))";
     
                //Specify the Base for the search
                String searchBase = "dc=mydomain,dc=com";
     
                // Search for objects using the filter
                NamingEnumeration results = ctx.search(searchBase,searchFilter,searchCtls);
     
                //Loop through the search results
                while (results.hasMoreElements()) {
                    SearchResult sr = (SearchResult)results.next();
                    System.out.println("dn: " + sr.getName());
                     Attributes attrs = sr.getAttributes();
                    System.out.println("attributes: " + attrs);
                 }
                
                 ctx.close();
     
            } catch (NamingException e) {
                System.err.println("Searching failed: " + e);
            }
        }
    }
    


    The above code has been testet against SunONE and Active Directory, testing scenarios will be discussed in very details but the failed outputs are very much the same like:

    javax.naming.AuthenticationException: [LDAP: error code 49 - 8009030C: LdapErr: DSID-0C09043E, comment: AcceptSecurityContext error, data 0, vece
    at com.sun.jndi.ldap.LdapCtx.mapErrorCode(LdapCtx.java:2988)
    at com.sun.jndi.ldap.LdapCtx.processReturnCode(LdapCtx.java:2934)
    at com.sun.jndi.ldap.LdapCtx.processReturnCode(LdapCtx.java:2735)
    at com.sun.jndi.ldap.LdapCtx.connect(LdapCtx.java:2649)
    at com.sun.jndi.ldap.LdapCtx.<init>(LdapCtx.java:290)
    at com.sun.jndi.ldap.LdapCtxFactory.getUsingURL(LdapCtxFactory.java:175)
    at com.sun.jndi.ldap.LdapCtxFactory.getUsingURLs(LdapCtxFactory.java:193)
    at com.sun.jndi.ldap.LdapCtxFactory.getLdapCtxInstance(LdapCtxFactory.java:136)
    at com.sun.jndi.ldap.LdapCtxFactory.getInitialContext(LdapCtxFactory.java:66)
    at javax.naming.spi.NamingManager.getInitialContext(NamingManager.java:662)
    at javax.naming.InitialContext.getDefaultInitCtx(InitialContext.java:243)
    at javax.naming.InitialContext.init(InitialContext.java:219)
    at javax.naming.InitialContext.<init>(InitialContext.java:195)
    at javax.naming.directory.InitialDirContext.<init>(InitialDirContext.java:80)





    References:

  •  


     
    Powered by ForumEasy © 2002-2022, All Rights Reserved. | Privacy Policy | Terms of Use
     
    Get your own forum today. It's easy and free.