(RADIATOR) Digipass, PPTP and MSCHAPV2

Clem Colman clem at colmancomm.com
Fri Aug 12 15:44:52 CDT 2005


Mike/Hugh,

Thanks for your responses and confirming my suspicions.  Unfortunately 
it means Radiator can't do what I want in this particular application.  
The radius-pap authentication works just fine but unfortunately without 
at least MSCHAP authentication the Microsoft implementation of pptp 
cant negotiate mppe (Microsoft Point to Point Encryption), and hence no 
data encryption.  I'm far from an expert, but my understanding is the 
key negotiation and exchange is somehow tied up in password exchange.  
Whilst I know Bruce Schnier doesn't think much of mppe and the MS 
implementation of pptp, I'm sure he would think even less of pptp 
without any encryption at all.

So, at the risk of seeming impertinent I was going to ask is the authby 
digipass module something provided to OSC as is, or it it something you 
maintain?  If it is something you maintain is there any prospect of 
getting MSCHAPV2 authentication added to it.  Provided that you have a 
mechanism for knowing the value on a digipass token (the simple 
non-challenge ones) at any particular point in time (or a handful of 
values within a certain tolerable time drift) there doesn't seem to be 
any reason you couldn't simply compute the MS Hash of the pin+current 
token display, apply the challenge provided by the MSCHAPV2 to the 
client, and see if the value provided by the client matches any of the 
values you compute as legitimate.

I guess the first authentication will need to be done via pap-radius or 
some such, as the token needs to be synced with the database, for which 
you will need the actual token display, but it seems that after that 
the digipass code must have some ability to predict what will be on the 
display.

I'm assuming of course that the GO3 digipass tokens operate in a 
similar manner to the old RSA SecureID, which had a temporal rotation.  
The security mechanism might be different here and may mean you can't 
know the token display ahead of time (although I wonder how you 
authenticate if you don't).  Also, if you are using some proprietary 
non-OSC api it may not allow you to precompute token displays, and 
hence the MS Hash of such a value.

So from this lay person's perspective it seems like the problem is 
solvable, albeit with certain assumptions.  Any chance that you folks 
would consider implementing MSCHAPV2 into authby digipass?

Cheers,
Clem.

On 12/08/2005, at 3:47 PM, Hugh Irvine wrote:

>
> Hello Clem -
>
> It really is most helpful if you post a copy of your configuration 
> file and a trace 4 debug from Radiator showing what is happening.
>
> You are correct however when you say that PAP is required - from 
> section 6.55 of the Radiator manual ("doc/ref.html"):
>
> ......
>
> AuthBy DIGIPASS supports for Response Only (RO) and Challenge/Response 
> (CR) tokens. It supports Radius PAP, TTLS-PAP, EAP-GTC and EAP-OTP 
> authentication methods. When using Challenge/Response tokens with PAP 
> or TTLS-PAP, when the user enters an empty password, AuthBy DIGIPASS 
> will generate the Challenge to enter into the Digipass token. The 
> token will then generate a Response which the users enters as their 
> real password.
>
> .....
>
> Note that PAP is only relevant for the authentication.
>
> regards
>
> Hugh

--
Archive at http://www.open.com.au/archives/radiator/
Announcements on radiator-announce at open.com.au
To unsubscribe, email 'majordomo at open.com.au' with
'unsubscribe radiator' in the body of the message.


More information about the radiator mailing list