Bugtraq mailing list archives

Re: L0pht Security Advisory on NT Password Appraiser (fwd)


From: weld () L0PHT COM (Weld Pond)
Date: Mon, 25 Jan 1999 15:04:18 -0500


On Fri, 22 Jan 1999, David Damerell wrote:

I have been in communication with Mr. Quakenbush. He says that only
the demo version sends passwords in plaintext (I clearly have no
mechanism to confirm this); bought versions use SSL. He has not yet
addressed the issue of impersonating the server. He says that the Web
site will be updated to reflect recent developments.

It looks like this is better than it looks; presumably the l0pht folks
only had access to a demo version. The Quakenbush Web site does make
it clear that the 'full' version uses SSL, but not prominently.

The version (3.0.89) that supports SSL came out a day after the L0pht
Advisory.  We commend Mr. Quakenbush for his fast response to our advisory
but to pretend that his product did this before our advisory is
disengenuous.  His response to our advisory on his web site even states
that SSL was added in response to our advisory.

The response also states that changes have been made to keep the cleartext
password from every travelling over the internet.  A feature added
directly in response to our advisory.

Assuming that the issue of impersonating the server is addressed,
Quakenbush seem to be better than first portrayed here - although
clearly the demo version should be more obviously marked as to how
extremely dangerous it is.

Yes, better because we made users and the vendor aware of serious security
flaws in the Password Appraiser product. Our advisory had the desired
effect. These changes may never have taken place if our security
analysis of the product had never been done and made public.  The product
was in its 3rd major release and the security vulnerability was still
there.


[There was the usual marketing blurb about how they write tools for
crackers and we write them for good guys and so our tools must be
better.]

Har. Har. So because our tool is more powerful and doesn't require sending
your hashes to an untrusted party, ours is for crackers and not for NT
administrators and NT security professionals?

OK, now let me then offer a blurb. Serious architecture flaws such as
sending password hashes and passwords in the clear over the internet shows
a lack of security expertise. Really, this is kindergarten stuff here.
Windows NT has been using a challenge-response mechanism to encrypt the
password hashes as they travel over the netowrk for years. There are still
some vulnerabilities there but the concept of requiring hashes to be
encrypted over a network is surely not new.

I question the notion of sending your hashes to a software tool
vendor at all.  There is nothing stopping them from brute forcing the
hashes that they don't have in their dictionary and later adding them to
their dictionary.  Now their dictionary becomes extremely valuable to
anyone trying to attack a company or organization that uses their product.
If this was to fall into the wrong hands your organization would be at
increased risk.

-weld



--
David Damerell, Computer Officer, Department of Chemistry, Cambridge
Work: djsd100 () cam ac uk    Personal: damerell () chiark greenend org uk




Current thread: