On 1/10/2012 11:38 AM, Peter Sylvester wrote:
an excerpt from rfc 5054 paragraph 3.3


   If an attacker learns a user's SRP verifier (e.g., by gaining access
   to a server's password file), the attacker can masquerade as the real
   server to that user, and can also attempt a dictionary attack to
   recover that user's password.

   An attacker could repeatedly contact an SRP server and try to guess a
   legitimate user's password.  Servers SHOULD take steps to prevent
   this, such as limiting the rate of authentication attempts from a
   particular IP address or against a particular user name.

...

   If the client receives an "unknown_psk_identity" alert in response to
   a client hello, this alert may have been inserted by an attacker.
   The client should be careful about making any decisions, or forming
   any conclusions, based on receiving this alert

It seems the OP's problem on the client is that either OpenSSL never
*sends* that alert ("unknown_psk_identity"), or that OpenSSL chooses
to log and report that alert as something else.

It also seems that the OP's problem on the server is that OpenSSL
does not log and report this condition clearly at the server end, where
this condition is directly known.

As a professional, I realize the need in some situations not to tell the
remote client why they were rejected, but not telling the higher level
server code and thus the servers security officer is never a good idea.

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to