> Maybe that's an acceptable compromise for your users, but I want to be > absolutely clear about the trade-offs involved.
As I said we don't know the user password, but I understand what you mean about the sync's crypto model. For the project I'm working on, we will use Sync for his Web Browser Sync abilities, not for the crypto. ATM if the password is secure until it's arrived at the login server, it's good as MITM attack won't work (and it's the most important for now). >https://github.com/mozilla/fxa-auth-server/wiki/onepw-protocol I'll look at this for the Sync 1.5 part of the project. > First, you can't verify this hashed password against an exiting AD user > database, which are typically designed for verifying cleartext passwords. > You would either need to modify your Active Directory to use an fxa-style > password verifier, or store the fxa-style password verifier as a separate > record in the user db. This could be a problem to implement a unique password between AD and FXA :/ I'll look into it. Robin Aleman Apprentice engineer - Software integration Customer Integration & Support EQUANT France - Sophia Antipolis +00 33 4 92 96 64 48 [email protected] -----Original Message----- From: Ryan Kelly [mailto:[email protected]] Sent: Friday, July 04, 2014 01:38 To: [email protected]; ALEMAN Robin SCE/ID ITS Subject: Re: Sync-reg / FXA : Active Directory authentication On 4/07/2014 3:18 AM, Richard Newman wrote: >> The goal would be to at least allow users to have one password for Sync & >> AD. > > If your directory service knows the user password, or even a weak hash of it, > then by definition that's a non-goal, because it would defeat Sync's ability > to do end-to-end encryption. By way of a little more detail here, the authentication dance between Firefox and fxa-auth-server is pretty complex and is documented at: https://github.com/mozilla/fxa-auth-server/wiki/onepw-protocol Firefox does not send the cleartext password for authentication. It computes a hash of the password and sends that to the server instead. This poses two problems for integration with other auth stacks like Active Directory. First, you can't verify this hashed password against an exiting AD user database, which are typically designed for verifying cleartext passwords. You would either need to modify your Active Directory to use an fxa-style password verifier, or store the fxa-style password verifier as a separate record in the user db. Second, as Richard points out above, you will substantially weaken the security properties of sync. If some other part of the system sends the auth password to the server in plaintext, then you lose almost all benefits of sync's crypto model. Maybe that's an acceptable compromise for your users, but I want to be absolutely clear about the trade-offs involved. Cheers, Ryan _________________________________________________________________________________________________________________________ Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration, Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci. This message and its attachments may contain confidential or privileged information that may be protected by law; they should not be distributed, used or copied without authorisation. If you have received this email in error, please notify the sender and delete this message and its attachments. As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified. Thank you. _______________________________________________ Sync-dev mailing list [email protected] https://mail.mozilla.org/listinfo/sync-dev

