Received: with ECARTIS (v1.0.0; list gopher); Thu, 10 Oct 2002 22:12:50 -0500 (EST) Return-Path: Delivered-To: gopher@complete.org Received: from aibo.runbox.com (aibo.runbox.com [193.71.199.94]) (using TLSv1 with cipher EDH-RSA-DES-CBC3-SHA (168/168 bits)) (Client did not present a certificate) by gesundheit.complete.org (Postfix) with ESMTP id 31832644CD for ; Thu, 10 Oct 2002 22:12:43 -0500 (EST) Received: from [10.9.9.9] (helo=fetch.runbox.com) by tramp.runbox.com with esmtp (Exim 4.05-VA-mm1) id 17zqEB-0007m8-00 for gopher@complete.org; Fri, 11 Oct 2002 05:12:39 +0200 Received: from [204.71.148.19] (helo=enterprise) (Authenticated Sender=hardburn) by fetch.runbox.com with asmtp (Exim 3.35 #1) id 17zqDy-0004MJ-00 for gopher@complete.org; Fri, 11 Oct 2002 05:12:27 +0200 Content-type: text/plain; charset=iso-8859-1 From: Timm Murray To: gopher@complete.org Subject: [gopher] Authentication Date: Thu, 10 Oct 2002 22:13:59 -0500 X-Mailer: KMail [version 1.4] References: <200210091223.FAA28328@stockholm.ptloma.edu> <200210091703.53365.hardburn@runbox.com> In-Reply-To: <200210091703.53365.hardburn@runbox.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Message-Id: <200210102214.07166.hardburn@runbox.com> X-archive-position: 700 X-ecartis-version: Ecartis v1.0.0 Sender: gopher-bounce@complete.org Errors-to: gopher-bounce@complete.org X-original-sender: hardburn@runbox.com Precedence: bulk Reply-to: gopher@complete.org List-help: List-unsubscribe: List-software: Ecartis version 1.0.0 List-ID: Gopher X-List-ID: Gopher List-subscribe: List-owner: List-post: List-archive: X-list: gopher -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 The document below is a generic means of authenticating using Gopher+ ASK fields. I've built it to be the first half of an overall Gopher upload means, but it could be used for downloading, too. It breaks the "smart server, dumb client" tradition, but I think it is necessary in this case, unless you don't care about sending passwords in plaintext. Gopher+ SRP Authentication By Timm Murray This document provides a secure means of authentication using the Secure Remote Password (SRP) scheme. This scheme is documented in RFC 2945. Implementors should be familer with that RFC. In breaking with Gopher tradition, this document uses '\t' to denote a tab, '\r' to denote a cariage return, and '\n' to denote a newline. 'C:' is a line of text sent by the client, and 'S: is a line sent by the server. Calculations by one side or the other are contained in '[' ']' brackets, with a note specifiying who is doing the calculations. Any numbers sent should be Base16 encoded [0-9A-Fa-f]. '|' indicates string cancatanation. '^' is exponentation. '%' is integer remainder. '==' checks for equivilence, while '!=' checks for unequivilence. SHA1() does an SHA-1 hash on the data. SHA1_Interleave() is a special function that doubles the normal length of the SHA-1 hash, and is described in RFC 2945. The means of storing username/password/salt values is also described in RFC 2945. In short: u = stored username v = stored password verifier s = salt value At the beginning of the connection, the server sends a "HashType" field. This is a string specifying the type of cryptgraphic hash to use. Where the protocol specifies "SHA1()" in calculations, the client and server MUST replace it with the proper hash type. "SHA1_Interleave()" is also modified accordingly. At a bare minimum, the clients and servers MUST implement the following: Name Referance - ---- --------- SHA-1 RFC 3174 MD5 RFC 1321 Authentication works as follows: C: \r\n S: +ASK \r\n [Server: selects values for g and N ] S: Ask: Username? \t g \t N \t HashType\r\n [Client: if unrecoginized HashType, then send "Unknown Hash" and cut connection a = random() A = g^a % N ] C: U \t A \r\n [Server: if A % N == 0, then cut the connection. v = b = random() B = (u + g^b) % N s = salt stored for username ] S: Ask: What is M? \t s \t B \r\n [Client: if B % N == 0, then cut the connection. p = x = SHA(s | SHA(U | ':' | p)) S = (B - g^x)^(a + u * x) % N K = SHA1_Interleave(S) M = SHA1(SHA1(N) XOR SHA1(g) | SHA1(U) | S | A | B | K) ] [Server: S = (A * v^u)^b % N K = SHA1_Interleave(S) ] C: M \r\n [Server: J = SHA1(SHA1(N) XOR SHA1(g) | SHA1(U) | S | A | B | K) if J != M, then cut the connection. L = SHA1(A | M | K) ] [Client: I = SHA1(A | M | K) ] S: Choose: L \t OK \t Wrong [Client: if L != I, then cut the connection ] C: OK The server now proceeds with normal operation on the selector string. - -- Evidance exists that X is only the second worst windowing system in the world. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.4 (GNU/Linux) Comment: For info see http://www.gnupg.org iEYEARECAAYFAj2mQf4ACgkQqpueKcacfLQEewCgpAWo8CxaEPU7I0TWM+AbQCtz 09IAni/TV3eDY1m6Frx4Se0EbGCHdqvv =I+hZ -----END PGP SIGNATURE-----