File: passlib.hash.cisco_pix.rst

package info (click to toggle)
python-passlib 1.7.4-6
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 3,920 kB
  • sloc: python: 23,094; makefile: 3
file content (205 lines) | stat: -rw-r--r-- 7,656 bytes parent folder | download | duplicates (4)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
.. index:: Cisco; PIX hash

==================================================================
:class:`passlib.hash.cisco_pix` - Cisco PIX MD5 hash
==================================================================

.. currentmodule:: passlib.hash

.. include:: ../_fragments/insecure_hash_warning.rst

.. versionadded:: 1.6

Overview
========
.. include:: ../_fragments/asa_verify_callout.rst

The :class:`cisco_asa` class implements the "encrypted" password hash algorithm commonly found on Cisco
ASA systems. The companion :class:`cisco_pix` class
implements the older variant found on Cisco PIX.
Aside from internal differences, and slightly different limitations,
the two hashes have the same format, and in some cases the same output.

These classes can be used directly to generate or verify a hash for a specific
user.  Specifying the user account name is required for this hash::

    >>> from passlib.hash import cisco_asa

    >>> # hash password using specified username
    >>> hash = cisco_asa.hash("password", user="user")
    >>> hash
    'A5XOy94YKDPXCo7U'

    >>> # verify correct password
    >>> cisco_asa.verify("password", hash, user="user")
    True

    >>> # verify correct password w/ wrong username
    >>> cisco_asa.verify("password", hash, user="other")
    False

    >>> # verify incorrect password
    >>> cisco_asa.verify("letmein", hash, user="user")
    False

The main "enable" password can be hashes / verified just by omitting
the ``user`` parameter, or setting ``user=""``::

    >>> # hash password without associated user account
    >>> hash2 = cisco_asa.hash("password")
    >>> hash2
    'NuLKvvWGg.x9HEKO'

    >>> # verify password without associated user account
    >>> cisco_asa.verify("password", hash2)
    True

.. seealso:: the generic :ref:`PasswordHash usage examples <password-hash-examples>`

Interface
=========

.. autoclass:: cisco_pix()

.. autoclass:: cisco_asa()

.. note::

    These hash algorithms have a context-sensitive peculiarity.
    They take in an optional username to salt the hash,
    but have specific restrictions...

    * The username *must* be provided in order to correctly hash passwords
      associated with a user account on the Cisco device.

    * Conversely, the username *must not* be provided (or must be set to ``""``)
      in order to correctly hash passwords which don't have an associated user
      account (such as the "enable" password).

.. rst-class:: html-toggle

Format & Algorithm
==================
Cisco PIX & ASA hashes consist of a 12 byte digest, encoded as a 16 character
:data:`HASH64 <passlib.utils.binary.h64>`-encoded string. An example
hash (of ``"password"``, with user ``""``) is ``"NuLKvvWGg.x9HEKO"``.

The PIX / ASA digests are calculated as follows:

1. The password is encoded using ``UTF-8`` (though entering non-ASCII
   characters is subject to interface-specific issues, and may lead
   to problems such as double-encoding).

   If the result is greater than 16 bytes (for PIX), or 32 bytes (for ASA),
   the password is not allowed -- it will be rejected when set,
   and simplify not verify during authentication.

2. If the hash is associated with a user account,
   append the first four bytes of the user account name
   to the end of the password. If the hash is NOT associated
   with a user account (e.g. it's the "enable" password),
   this step should be omitted.

   If the user account is 1-3 bytes, it is repeated until all 4 bytes are filled
   up (e.g. "usr" becomes "usru").

   For :class:`!cisco_asa`,
   this step is omitted if the password is 28 bytes or more.

3. The password+user string is truncated, or right-padded with NULLs,
   until it's 16 bytes in size.

   For :class:`!cisco_asa`,
   if the password+user string is 16 or more bytes,
   a padding size of 32 is used instead.

4. Run the result of step 3 through MD5.

5. Discard every 4th byte of the 16-byte MD5 hash, starting
   with the 4th byte.

6. Encode the 12-byte result using :data:`HASH64 <passlib.utils.binary.h64>`.

.. versionchanged:: 1.7.1

    Updated to reflect current understanding of the algorithm.

Security Issues
===============
This algorithm is not suitable for *any* use besides manipulating existing
Cisco PIX hashes, due to the following flaws:

* Its use of the username as a salt value (and only the first four characters
  at that), means that common usernames (e.g. ``admin``, ``cisco``) will occur
  more frequently as salts, weakening the effectiveness of the salt in
  foiling pre-computed tables.

* Its truncation of the ``password+user`` combination to 16 characters
  additionally limits the keyspace, and the effectiveness of the username
  as a salt; making pre-computed and brute force attacks much more feasible.

* Since the keyspace of ``password+user`` is still a subset of ascii characters,
  existing MD5 lookup tables have an increased chance of being able to
  reverse common hashes.

* Its simplicity, and the weakness of MD5, makes high-speed brute force attacks
  much more feasible.

* Furthermore, it discards of 1/4 of MD5's already small 16 byte digest,
  making collisions much more likely.

Deviations
==========
This implementation tries to adhere to the canonical Cisco implementation,
but without an official specification, there may be other unknown deviations.
The following are known issues:

* Unicode Policy:

  ASA documentation [#charset]_ indicates it uses UTF-8 encoding,
  and Passlib does as well.  However, some ASA interfaces
  have issues such as: ASDM may double-encode unicode characters,
  and SSH connections may drop non-ASCII characters entirely.

* How usernames are added is not entirely pinned down.  Under ASA, 3-character
  usernames have their last character repeated to make a string of length 4.
  It is currently assumed that a similar repetition would be applied to
  usernames of 1-2 characters, and that this applies to PIX as well;
  though neither assumption has been confirmed.

* .. _passlib-asa96-bug:

  **Passlib 1.7.1 Bugfix**: Prior releases of Passlib had a number of issues
  with their implementation of the PIX & ASA algorithms.   As of 1.7.1,
  the reference vectors were greatly expanded, and then tested against
  an ASA 9.6 system.  This revealed a number of errors in passlib's implementation,
  which under the following conditions would create hashes that were
  unverifiable on a Cisco system:

  - PIX and ASA: Usernames containing 1-3 characters were not appended correctly (step 2, above).

  - ASA omits the user entirely (step 2, above) for passwords with >= 28 characters,
    not >= 27.  Non-enable passwords of exactly 27 characters were previous hashed
    incorrectly.

  - ASA's padding size decision (step 3, above) is made after the user
    has been appended, not before.  This caused prior releases to
    incorrectly hash non-enable passwords of length 13-15.

  Anyone relying on cisco_asa or cisco_pix should upgrade to Passlib 1.7.1 or newer
  to avoid these issues.

.. rubric:: Footnotes

.. [#] Description of PIX algorithm -
       `<http://www.perlmonks.org/index.pl?node_id=797623>`_

.. [#] Message threads hinting at how username is handled -
       `<http://www.openwall.com/lists/john-users/2010/02/02/7>`_,
       `<www.freerainbowtables.com/phpBB3/viewtopic.php?f=2&t=1441>`_

.. [#] Partial description of ASA algorithm - 
       `<https://github.com/stekershaw/asa-password-encrypt/blob/master/README.md>`_

.. [#charset] Character set used by ASA 8.4 -
       `<http://www.cisco.com/c/en/us/td/docs/security/asa/asa84/configuration/guide/asa_84_cli_config/ref_cli.html#Supported_Character_Sets>`_