[PLUG-Devel] HackFest Series: LDAP

Lisa Kachold lisakachold at obnosis.com
Fri Jan 2 10:34:58 MST 2009


LDAP, RFC 4513 has some security issues.  In any security model, we mitigate possible problems with layered technology.
RFC:  http://www.rfc-editor.org/rfc/rfc4513.txt

PCI Compliance and LDAP Security:
The best way to mitigate LDAP  network issues, is through PCI compliance or isolated server network engineering, completing the model with  VLAN or switch network isolation where possible packet interception might occur, since passwords and packets are sent either in clear text or encoded using Base64 encoding,  which can be trivially intercepted.

http://www.faqs.org/ftp/pub/internet-drafts/draft-behera-ldap-password-policy-09.txt

Extract from the draft's abstract:
"..In order to improve the security of LDAP directories and make it difficult for password cracking programs to break into directories, it is desirable to enforce a set of rules on password usage. These rules are made to ensure that users change their passwords periodically, passwords meet construction requirements, the re-use of old password is restricted, and users are locked out after a certain number of failed attempts."

Network or "bottom up" OSI Security:
With such a concentration of data in the directory, network security becomes very important. Anyone who could modify the data could give themselves access to vast numbers of machines at a stroke. Some data needs to be protected from unauthorized viewing: although all passwords are hashed, anyone who can read the hashes can mount a dictionary attack.

Network Mitigation:
The layer that, in the final analysis, protects LDAP from shared network based attacks, is layer 8 - Human Trust.  I.E. no professional on your network is expected to be so ill-intentioned or fool hardy to mis-use trust.  At some point - all of us are dangerous and unstoppable, it's expected we have bigger games to play than exploit trust?

OSI Application Layer or Top Down:
More subtly, anyone who can hijack a client-server connection can feed bogus data to an individual client, or use the client's privileges to modify server data. All these things can be protected against, and LDAP now has most of the tools needed to do it.

Perl Mod Recommendations:
http://search.cpan.org/~gbarr/perl-ldap/lib/Net/LDAP/Security.pod

J2EE:
http://www.theserverside.com/tt/articles/article.tss?l=LDAP

MSDN LDAP:
http://msdn.microsoft.com/en-us/library/aa913688.aspx

Exploits:  Always check your VERSIONS and mitigate or patch any known issues!

April 2008 Cisco ASA/PIX LDAP hole:  http://www.cisco.com/en/US/products/products_security_advisory09186a0080833166.shtml

Web Injection Attacks: http://www.webappsec.org/projects/threat/classes/ldap_injection.shtml

LDAP Server Information Disclosure Vulnerability: http://www.google.com/url?q=http://www.lifedork.com/ldapuserenum-active-directory-ldap-server-information-disclosure-vulnerability.html&sa=X&oi=revisions_result&resnum=1&ct=result&cd=1&usg=AFQjCNFKLxYW4m5tri9_rhSuDCvHAZPyTA

PHP LDAP:
http://www.securitytutorials3.thetazzone.com/owasp.html

Hackin9 gives us examples:
http://blog.security4all.be/2008/04/hakin9-magazine-3rd-edition-2008-ldap.html

The proof is in the practice - Labs:

Extracting hashes with crypt/John:  http://marc.info/?l=john-users&m=120270251402411&w=2

Using John: http://www.openwall.com/lists/john-users/2005/09/17/1

Tools: 
http://www.crackserialkeygen.us/search/ldap+crack

Disclaimer: At no time have we compared simple SMTP, SSH, HTTP auth or AD LDAP or mail password security, or analyzed any other security risks as comparisons.  Intention is to educate.  Each Nix user must understand the risks before implementing any protocol.  LDAP can make your network more secure when properly implemented.

www.Obnosis.com |  http://en.wiktionary.org/wiki/Citations:obnosis |  (503)754-4452
January PLUG HackFest = Kristy Westphal, AZ Department of Economic Security Forensics @ UAT 1/10/09 12-3PM


_________________________________________________________________
Send e-mail anywhere. No map, no compass.
http://windowslive.com/oneline/hotmail?ocid=TXT_TAGLM_WL_hotmail_acq_anywhere_122008
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.PLUG.phoenix.az.us/pipermail/plug-devel/attachments/20090102/5ad2c8bc/attachment.htm 


More information about the PLUG-devel mailing list