lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <A45FB59A-6E36-11D8-8BD5-000393496BE8@lassitu.de>
From: stb at lassitu.de (Stefan Bethke)
Subject: Re: Multiple issues with Mac OS X AFP client

Am 04.03.2004 um 04:34 schrieb Marukka:

> Nice find. Most people really shouldn?t be using AFP. I know that 
> Classic
> MacOS machines store the passwords on disk using a simple XOR cipher.

Any local storage of passwords is only as secure as the security of the 
key store.  The lack of sophistication in the password store in many 
AFP clients is well documented; in fact, the AFP server can advise the 
client to not allow storing the password.

> I would assume that they also transmit the password using the same 
> cipher.

<http://developer.apple.com/documentation/Networking/Conceptual/AFP/>

An AFP client /may/ transmit authentication information in the clear, 
but for at least ten years, the standard method used was a 
DES-encrypted challenge-response protocol.  I believe a 
challenge-response protocol was the preferred authentication protocol 
from the very start of AFP.

> SecureMac.com has a article on this if anyone is interested.

Is that so?  Google didn't seem to find much...

-- 
Stefan Bethke <stb@...situ.de>   Fon +49 170 346 0140


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ