[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1437166682.20050719133536@SECURITY.NNOV.RU>
Date: Tue, 19 Jul 2005 13:35:36 +0400
From: 3APA3A <3APA3A@...URITY.NNOV.RU>
To: "Amit Klein (AKsecurity)" <aksecurity@...pop.com>
Cc: bugTraq <bugtraq@...urityfocus.com>
Subject: Re: NTLM HTTP Authentication is insecure by design - a new writeup by Amit Klein
Dear Amit Klein (AKsecurity),
--Monday, July 18, 2005, 9:40:32 PM, you wrote to bugtraq@...urityfocus.com:
AKA> NTLM HTTP Authentication
AKA> (and possibly other connection-oriented
AKA> HTTP authentication and authorization protocols)
AKA> is insecure by design
NTLM authentication is insecure by design for external authentication,
because of "single signon" ideology. NTLM authentication can be used
for NTLM proxy attack. For example, attacker who can hijack or spoof
server connection with NTLM authentication can use this connection to
access different Web server, mail server or file server with client's
credentials. This is known for many years and was discussed for many
times. Few years ago Internet Explorer was patched to use NTLM
authentication only for local network zone. Local network are hosts
with NetBIOS name (for example WEBSRV, excluded by default from proxy)
and list of proxy exclusions.
So, under default configuration, NTLM will not be used through proxy
server, at least in Internet Explorer.
--
~/ZARAZA
http://www.security.nnov.ru/
Powered by blists - more mailing lists