Enabling legacy authentication in Windows installer leads to less secur config
than possible
--------------------------------------------------------------------------------------------
Key: CORE-6011
URL: http://tracker.firebirdsql.org/browse/CORE-6011
Project: Firebird Core
Issue Type: Bug
Components: Build Issues / Porting, Installation, Security
Affects Versions: 4.0 Beta 1
Reporter: Mark Rotteveel
When you enable legacy authentication in the Windows installer, it will
configure firebird.conf with
AuthServer = Legacy_Auth, Srp, Win_Sspi
AuthClient = Legacy_Auth, Srp, Win_Sspi
This is insecure for two reasons:
1. It is missing the new Srp256 plugin which is the default
2. The order for authentication plugins should be from most secure to least
secure to avoid leaking information about credentials of Srp users (eg if
Srp256 or Srp succeeds, there is no need to send the password using the less
secure UnixCrypt hash in Legacy_Auth).
In other words, enabling legacy authentication should produce
AuthServer = Srp256, Win_Sspi, Legacy_Auth
(or maybe AuthServer = Srp256, Srp, Win_Sspi, Legacy_Auth)
The default for AuthClient (AuthClient = Srp256, Srp, Win_Sspi, Legacy_Auth) is
already sufficient and secure enough, so there is no need to write an explicit
config.
Personally, I'd also prefer if UserManager order would be set to Srp,
Legacy_UserManager, but to support legacy tools that is not really an option.
--
This message is automatically generated by JIRA.
-
If you think it was sent incorrectly contact one of the administrators:
http://tracker.firebirdsql.org/secure/Administrators.jspa
-
For more information on JIRA, see: http://www.atlassian.com/software/jira
Firebird-Devel mailing list, web interface at
https://lists.sourceforge.net/lists/listinfo/firebird-devel