[erlang-questions] Erlang cookies are secure

Tony Rogvall tony@REDACTED
Fri Jun 10 23:52:52 CEST 2016



"typed while walking!"

> On 10 juni 2016, at 22:10, Per Hedeland <per@REDACTED> wrote:
> 
> Tony Rogvall <tony@REDACTED> wrote:
>> 
>> I am not sure what you mean by sniff cookies?
>> 
>> The distribution has been sending blank cookies since first open source release.
>> The distribution do not send the cookie in clear text but rely on a MD5 challenge procedure
>> at connection setup.
> 
> Hi Tony!
> 
> Indeed - and I will take credit for pestering you to fix that just
> before the first open source release:-) (I will not divulge what it did
> before that...).
> 
Yes, master.  :-)

>> So Erlang is more likely to be vulnerable to connection hijacking since not every message
>> is signed.
> 
> Yes - the *default* distribution fulfills none of the CIA requirements
> (no, not that evil US thing, but Confidentiality, Integrity, and
> Availability). But this has nothing to do with the authentication
> mechanism as such, and can be fixed by using TLS - which also brings one
> or more other authentication mechanisms, but they are not in any
> fundamental sense more "secure" than the cookie authentication.
> 
>> So keep the nodes safe and away from random users. At least until we get Safe Erlang ( any decade now )
> 
> Sure - but this point is actually also confusing in a cookie discussion,
> as shown by other messages in this thread - it is about the
> *authorization* you automatically get at the point when you have managed
> to break the authentication mechanism - i.e. basically you can do
> "anything". But this is independent of the strength of the
> authentication mechanism itself.
> 

My point was just that if the city wall has collapsed you could still have a couple of more walls to protect your but.

> I do find it rather tiresome with this constant ridicule of the cookie
> authentication from people who haven't even bothered to do a basic
> investigation of how it works, let alone done any actual security
> analysis.
> 
> And just to put another myth to death, no, you are not required to use
> the same cookie on all your distributed erlang nodes - every node is
> capable of maintaining a specific cookie for every other node, RTFM
> erlang:set_cookie/2.
> 
> It is absolutely true that *maintaining* security in a network with
> cookie-based authentication can be troublesome, and that e.g. TLS with
> certificate authentication can do much better in that respect, as long
> as you have mechanisms for certificate revocation properly set up (which
> in turn is not entirely trivial to do).
> 
> But again, as long as you do not throw your cookies around, AFAIK no-one
> has demonstrated any fundamental weakness with the mechanism as such.
> 
> --Per




More information about the erlang-questions mailing list