[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <A45FB59A-6E36-11D8-8BD5-000393496BE8@lassitu.de>
Date: Fri, 5 Mar 2004 00:49:57 +0100
From: Stefan Bethke <stb@...situ.de>
To: Marukka <marukka@...soleconductor.com>
Cc: Chris Adams <chris@...robable.org>, BUGTRAQ <bugtraq@...urityfocus.com>,
"'full-disclosure@...ts.netsys.com'" <full-disclosure@...ts.netsys.com>
Subject: Re: Multiple issues with Mac OS X AFP client
Am 04.03.2004 um 04:34 schrieb Marukka:
> Nice find. Most people really shouldn’t be using AFP. I know that
> Classic
> MacOS machines store the passwords on disk using a simple XOR cipher.
Any local storage of passwords is only as secure as the security of the
key store. The lack of sophistication in the password store in many
AFP clients is well documented; in fact, the AFP server can advise the
client to not allow storing the password.
> I would assume that they also transmit the password using the same
> cipher.
<http://developer.apple.com/documentation/Networking/Conceptual/AFP/>
An AFP client /may/ transmit authentication information in the clear,
but for at least ten years, the standard method used was a
DES-encrypted challenge-response protocol. I believe a
challenge-response protocol was the preferred authentication protocol
from the very start of AFP.
> SecureMac.com has a article on this if anyone is interested.
Is that so? Google didn't seem to find much...
--
Stefan Bethke <stb@...situ.de> Fon +49 170 346 0140
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists