Re: [Dovecot] Ideas for Webmail/OTP

2007-08-07 Thread Steffen Kaiser

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Mon, 23 Jul 2007, Frank Behrens wrote:


Solution 1:
When PAM is configured for IMAP the user can use a one-time-password in the 
same way
as before. The problem is, that the user must know the sequence number for the 
password
(otp challenge), so we need a way to display it. The PAM module supplies the 
otp challenge
in the conversation function, but the challenge is not processed by the IMAP 
server.
My proposal: The IMAP server stores the challenge from the conversation 
function and
includes it in the LOGIN response, when the login was not successful. So a user 
can try a
login with a wrong dummy password and get knowlegdge about the current otp 
sequence.


You mean, the client issues LOGIN (with a dummy password), because Dovecot
needs to aquire the OTP challenge first, this LOGIN attempt is failed,
but the username can be used to aquire the OTP challenge.  It is reported
back, via the LOGIN failure string and, secondly, another LOGIN attempt
is sent, this time with the same username and a real password.

I guess, you'll need to tweak the webmail interface a bit, that this
sequence is working well.

There are time-related OTPs, where the sequence number is derived from the 
current time. When a client tries a logon, the server calculates plenty of 
OTPs in the near of the current time and adjust itself to the client, in 
case the device's clock is running too slow or fast.


I would say, this kind is more suitable for this purpose. However, one requires
some sort of electronical device for it.


Solution 2:
Webmail clients do not use persistent connections in most cases. A OTP login 
needs
different passwords for every displayed web page.
My proposal: Use dovecot's login cache and do not ask the os for every login. 
:-)


This will definitely a must then.


Solution 3:
My proposal: Create a new IMAP command XSETREMOTEIP. With this IMAP extension 
a
client can set the real IP address of remote client. The access to this command 
is restricted
to the webserver with a new configuration parameter trusted clients, which 
holds an IP
address with mask.


Hmm, any clients accessing webmail via the same proxy or from the same 
NATed organisation will use the same IP, dial-up IPs switch the users more 
often than anything else. I don't think that restricting by IPs you have 
no knowlegde about is save.


Bye,

- -- 
Steffen Kaiser

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iQEVAwUBRrgspy9SORjhbDpvAQIJmAgA06boNvZrFTS4kNyky6ywUiYv9CHu99tI
GT4iQNezyZz0PensPgGJp6ZAJGDdlAZ1ZxWBth1JCvpVZSBCwnbmbEbWnYtCi9OR
v/eynzRFta/11nFy0+AB1Pf2BuoFFPtXy+hC6DnpPcLutD4Q+bvm3Kqdry72PmyQ
lBUg8TxTwuDZ0sY0TTAP6VaJCmTG1RvnC5dZp4f6C3yN7kwXbcgS1rkHGr8V6Frs
z9ZXMkRYUCpG/ufCQqFB9YTAAOxWM8DrKsmQZNClmkypc+q+v0w11BfcF6SK7v9I
cdQqSca7AmXR4q2UYoyvAGGn7rF0cDJJXKI0iQWfWr2nchnx0/PoUA==
=wZxi
-END PGP SIGNATURE-


Re: [Dovecot] Ideas for Webmail/OTP

2007-08-07 Thread Frank Behrens
Steffen Kaiser [EMAIL PROTECTED] wrote on 7 Aug 2007 10:26:
 You mean, the client issues LOGIN (with a dummy password), because Dovecot
 needs to aquire the OTP challenge first, this LOGIN attempt is failed,
 but the username can be used to aquire the OTP challenge.  It is reported
 back, via the LOGIN failure string and, secondly, another LOGIN attempt
 is sent, this time with the same username and a real password.

Yes, this was my intention.

 I guess, you'll need to tweak the webmail interface a bit, that this
 sequence is working well.

It's easy: If a login fails the webmailer has to write an error message in any 
case. Simply 
include the IMAP error response.

 There are time-related OTPs, where the sequence number is derived from the 
 current time. When a client tries a logon, the server calculates plenty of 
 OTPs in the near of the current time and adjust itself to the client, in 
 case the device's clock is running too slow or fast.

Of course, this is more sophisticated and more expensive. My proposol uses OPIE 
- One-
time Passwords In Everything.  But remember: With my proposal you use always 
the login 
configuration from operating system. If you have a pam module for an electronic 
one-time 
password generator you can use it with IMAP and webmail without additional 
changes in 
IMAP- or webmail-server.

  Solution 3:
  My proposal: Create a new IMAP command XSETREMOTEIP. With this IMAP 
  extension a
  client can set the real IP address of remote client. The access to this 
  command is restricted
  to the webserver with a new configuration parameter trusted clients, 
  which holds an IP
  address with mask.
 
 Hmm, any clients accessing webmail via the same proxy or from the same 
 NATed organisation will use the same IP, dial-up IPs switch the users more 
 often than anything else. I don't think that restricting by IPs you have 
 no knowlegde about is save.

I meant it inversely. You can allow the usage of normal passwords for all 
IMAP and webmail 
clients in local network and restrict external clients to OTP. With pam 
configuration you make 
this decision for all logins (ssh, ftp), not only for IMAP with dovecot.

Regards,
   Frank
-- 
Frank Behrens, Osterwieck, Germany
PGP-key 0x5B7C47ED on public servers available.



Re: [Dovecot] Ideas for Webmail/OTP

2007-07-24 Thread Frank Behrens
Charles Marcus dovecot@dovecot.org wrote on 23 Jul 2007 13:21:

 Phillip T. George, on 7/23/2007 1:00 PM, said the following:
  SSL/TLS is not going to solve the keylogger and malware problem.  
  Basically, if you're on a public (or even a friend's) computer and 
  someone decides to monitor keystrokes using some application, your 
  password will be completely compromised.
 
 Well, thats true, but this really isn't a dovecot issue...

Yes, that's true. I believe I must make some additional notes to explain the 
reason for my 
mail:

1. I believe one One-time Passwords can be useful, especially in untrusted 
webmail 
environments.

2. Until now I did not find an easy solution to setup OTP with common used IMAP 
servers 
and webmail packages. If somebody is able to show me a solution I would be 
happy and we 
can abort this thread.

3. I did not use dovecot before, but when I evaluated some IMAP servers I came 
to the 
conclusion, that dovecot has a clean structure and can be extended easily. I 
was able to 
patch dovecot in order to show that the proposed solutions are possible.

So dovecot has no errors in this context, but I believe it could be extended 
easily and that's 
why I wrote in this mailing list. My hope is, that people comment:
- My ideas are stupid or not.
- My proposol is a useful IMAP extension, or we should solve the problem in 
other ways.
- We should extend dovecot a litle bit or leave it, because other mail servers 
does not 
implement such a feature.

I do not complain about dovecot, I'm proposing some enhancements, but may be in 
the 
wrong direction. I hope I do not disturb the mailing list readers.

Regards,
   Frank
-- 
Frank Behrens, Osterwieck, Germany
PGP-key 0x5B7C47ED on public servers available.



Re: [Dovecot] Ideas for Webmail/OTP

2007-07-24 Thread Timo Sirainen
On Mon, 2007-07-23 at 17:15 +0200, Frank Behrens wrote:
 Solution 1:
 When PAM is configured for IMAP the user can use a one-time-password in the 
 same way 
 as before. The problem is, that the user must know the sequence number for 
 the password 
 (otp challenge), so we need a way to display it. The PAM module supplies the 
 otp challenge 
 in the conversation function, but the challenge is not processed by the IMAP 
 server.
 My proposal: The IMAP server stores the challenge from the conversation 
 function and 
 includes it in the LOGIN response, when the login was not successful. So a 
 user can try a 
 login with a wrong dummy password and get knowlegdge about the current otp 
 sequence.

I'd like to see your patch for this. I've no idea how pam_otp works.

 Solution 3:
 When we configure PAM we can restrict/allow it's use depending on IP address 
 of client. 
 Unfortunately with a webmail client the IMAP client is always the the 
 webserver. It should be 
 possible, that the webserver forwards the client IP address to the IMAP 
 server. Furthermore 
 to use dovecot's login cache as described above in a safe manner, the IP 
 address should be 
 compared, too.
 My proposal: Create a new IMAP command XSETREMOTEIP. With this IMAP 
 extension a 
 client can set the real IP address of remote client. The access to this 
 command is restricted 
 to the webserver with a new configuration parameter trusted clients, which 
 holds an IP 
 address with mask.

Cyrus Murder has something similar to this I think. We could make it
compatible with it.



signature.asc
Description: This is a digitally signed message part


Re: [Dovecot] Ideas for Webmail/OTP

2007-07-24 Thread Charles Marcus

On 7/24/2007, Frank Behrens ([EMAIL PROTECTED]) wrote:
So dovecot has no errors in this context, but I believe it could be 
extended easily and that's 
why I wrote in this mailing list. My hope is, that people comment:

- My ideas are stupid or not.


Definitely not stupid - I hope you didn't get that from my response...

- My proposol is a useful IMAP extension, or we should solve the 
problem in other ways.
- We should extend dovecot a litle bit or leave it, because other 
mail servers does not implement such a feature.


As a plug-in I think this would be perfectly fine... in fact, when I 
replied, I had never heard of OTP - it is an intriguing concept...



I do not complain about dovecot, I'm proposing some enhancements, but
may be in the wrong direction. I hope I do not disturb the mailing
list readers.


Sorry if I came off a little harsh - it wasn't intended, and I do see 
now how this could be a useful feature... and now I see Timo has 
expressed interest, so I look forward to seeing what comes of this...


--

Best regards,

Charles


Re: [Dovecot] Ideas for Webmail/OTP

2007-07-24 Thread Timo Sirainen

On 24.7.2007, at 15.31, Frank Behrens wrote:

When you thing about it: A webmail client and the different IMAP  
login mechanisms fit not
very well together. So some posters are right: you should better  
use a real IMAP client. But
IMHO webmail is a useful solution, when you are on vacation or  
business travel and want to
acces your email. And together with one time passwords the security  
risk is not too high, so

you can use it.


This has also been in my TODO for years:

- support read-only logins. user could with alternative password  
get only
  read-access to mails so mails could be read relatively safely  
with

  untrusted computers. Maybe always send [ALERT] about the previous
  read-only login time with IP?



PGP.sig
Description: This is a digitally signed message part


Re: [Dovecot] Ideas for Webmail/OTP

2007-07-23 Thread Charles Marcus

On 7/23/2007, Frank Behrens ([EMAIL PROTECTED]) wrote:
I want to discuss some problems/enhancements for dovecot in a 
webmail/otp setup.


For access to an IMAP server like dovecot I see different client 
types:

a) a normal MUA installed in a more or less trusted environment
b) remote access via webmail from untrusted environments


What about:
c) a normal MUA accessing via the internet from  untrusted environments

This is the recommended way all of our users access their email - 
webmail is just for the occasional access from a friends or other 
computer that they don't use regularly.


For a) I see with dovecot and other IMAP servers no problems, tricky 
is the setup for b).


Webmail is very easy to do...


If you use a webmail client in an untrusted environment the risk is
high, that keyloggers and  other malware steal your password.


Eh? Thats what SSL/TLS is for... I agree that providing access - either 
via webmail or any other MUA - on an unsecured connection from an 
untrusted source is very hazardous - but setting up SSL is fairly simple 
too, and I even force SSL/TLS on all of my connections even inside our 
trusted network (no reason not to - the extra overhead is very small).


Sorry, but I don't understand the problem you are trying to solve...

--

Best regards,

Charles


Re: [Dovecot] Ideas for Webmail/OTP

2007-07-23 Thread Phillip T. George

Charles Marcus wrote:

On 7/23/2007, Frank Behrens ([EMAIL PROTECTED]) wrote:
I want to discuss some problems/enhancements for dovecot in a 
webmail/otp setup.


For access to an IMAP server like dovecot I see different client types:
a) a normal MUA installed in a more or less trusted environment
b) remote access via webmail from untrusted environments


What about:
c) a normal MUA accessing via the internet from  untrusted environments

This is the recommended way all of our users access their email - 
webmail is just for the occasional access from a friends or other 
computer that they don't use regularly.


For a) I see with dovecot and other IMAP servers no problems, tricky 
is the setup for b).


Webmail is very easy to do...


If you use a webmail client in an untrusted environment the risk is
high, that keyloggers and  other malware steal your password.


Eh? Thats what SSL/TLS is for... I agree that providing access - 
either via webmail or any other MUA - on an unsecured connection from 
an untrusted source is very hazardous - but setting up SSL is fairly 
simple too, and I even force SSL/TLS on all of my connections even 
inside our trusted network (no reason not to - the extra overhead is 
very small).


SSL/TLS is not going to solve the keylogger and malware problem.  
Basically, if you're on a public (or even a friend's) computer and 
someone decides to monitor keystrokes using some application, your 
password will be completely compromised.

Sorry, but I don't understand the problem you are trying to solve...



Re: [Dovecot] Ideas for Webmail/OTP

2007-07-23 Thread Charles Marcus

Phillip T. George, on 7/23/2007 1:00 PM, said the following:
SSL/TLS is not going to solve the keylogger and malware problem.  
Basically, if you're on a public (or even a friend's) computer and 
someone decides to monitor keystrokes using some application, your 
password will be completely compromised.


Well, thats true, but this really isn't a dovecot issue...

--

Best regards,

Charles


Re: [Dovecot] Ideas for Webmail/OTP

2007-07-23 Thread Phillip T. George

Charles Marcus wrote:

Phillip T. George, on 7/23/2007 1:00 PM, said the following:
SSL/TLS is not going to solve the keylogger and malware problem.  
Basically, if you're on a public (or even a friend's) computer and 
someone decides to monitor keystrokes using some application, your 
password will be completely compromised.


Well, thats true, but this really isn't a dovecot issue...

Well, actually it is.  Dovecot could possibly need some sort of 
authorization module addition to achieve what Frank Behrens was wanting 
to achieve.


-Phillip


Re: [Dovecot] Ideas for Webmail/OTP

2007-07-23 Thread Phillip T. George

Charles Marcus wrote:

Phillip T. George, on 7/23/2007 1:30 PM, said the following:

Charles Marcus wrote:

Phillip T. George, on 7/23/2007 1:00 PM, said the following:
SSL/TLS is not going to solve the keylogger and malware problem.  
Basically, if you're on a public (or even a friend's) computer and 
someone decides to monitor keystrokes using some application, your 
password will be completely compromised.



Well, thats true, but this really isn't a dovecot issue...


Well, actually it is.  Dovecot could possibly need some sort of 
authorization module addition to achieve what Frank Behrens was 
wanting to achieve.


Interesting... does any other mail server support anything like this? 
Not that that should be the sole criteria to judge whether or not 
something should be added, but...


I'm not sure if there is a mail server out there that has that specific 
feature.  Security innovations are surely good innovations to bring forth.





Re: [Dovecot] Ideas for Webmail/OTP

2007-07-23 Thread Phillip T. George



Phillip T. George wrote:

Charles Marcus wrote:

Phillip T. George, on 7/23/2007 1:30 PM, said the following:

Charles Marcus wrote:

Phillip T. George, on 7/23/2007 1:00 PM, said the following:
SSL/TLS is not going to solve the keylogger and malware problem.  
Basically, if you're on a public (or even a friend's) computer and 
someone decides to monitor keystrokes using some application, your 
password will be completely compromised.



Well, thats true, but this really isn't a dovecot issue...


Well, actually it is.  Dovecot could possibly need some sort of 
authorization module addition to achieve what Frank Behrens was 
wanting to achieve.


Interesting... does any other mail server support anything like this? 
Not that that should be the sole criteria to judge whether or not 
something should be added, but...


I'm not sure if there is a mail server out there that has that 
specific feature.  Security innovations are surely good innovations to 
bring forth.



Oh...also his post did include /OTP, which unless I'm mistaken, than 
means Off-Topic Post ..so it doesn't really matter if it had to do with 
Dovecot or not, right? :)


-Phillip


Re: [Dovecot] Ideas for Webmail/OTP

2007-07-23 Thread Phillip T. George

Joakim Ryden wrote:

On Mon, July 23, 2007 10:54 am, Phillip T. George wrote:
[...]
  

Oh...also his post did include /OTP, which unless I'm mistaken, than means


Off-Topic Post ..so it doesn't really matter if it had to do with Dovecot or
not, right? :)

:-)

I believe he was referring to One Time Passwords.

--Jo



  
Sorry for the poorly delivered jokeI was attempting to lighten the 
mood, since it started seem a bit flamey :)