[38544] in Kerberos

home help back first fref pref prev next nref lref last post

Re: Questions about supported_enctypes

daemon@ATHENA.MIT.EDU (Robbie Harwood)
Mon May 20 18:37:13 2019

From: Robbie Harwood <rharwood@redhat.com>
To: Greg Hudson <ghudson@mit.edu>,
        "Dan Mahoney (Gushi)"
	<danm@prime.gushi.org>, <kerberos@mit.edu>
In-Reply-To: <5ab490d3-2185-1083-215c-db3a27ccab3d@mit.edu>
Date: Mon, 20 May 2019 18:37:02 -0400
Message-ID: <jlgtvdolpm9.fsf@redhat.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="===============1581049455034482680=="
Errors-To: kerberos-bounces@mit.edu

--===============1581049455034482680==
Content-Type: multipart/signed; boundary="=-=-="; micalg=pgp-sha512;
	protocol="application/pgp-signature"

--=-=-=
Content-Type: text/plain

Greg Hudson <ghudson@mit.edu> writes:

> On 5/18/19 10:49 PM, Dan Mahoney (Gushi) wrote:
>
>> q3: On the same note, what are others in the modern world moving to
>> with this algo being deprecated?  Is there a current recommendation?
>> If one disables des3-cbc-sha1, what versions of kerberos are you
>> effectively blackholing?
>
> Any Kerberos implementation from the last 15 or so years will support
> the aes-sha1 enctypes, so aes256-cts-hmac-sha1-96 should interoperate
> with everything you're likely to run into.  des3-cbc-sha1 doesn't see
> a lot of use because it was introduced not long before the aes-sha1
> enctypes, and because it was never implemented by Microsoft (only MIT
> krb5 and Heimdal).

A breakdown of the why and what was conducted as part of rfc8429
(https://tools.ietf.org/html/rfc8429), which you may find helpful as
well.

>> (I have no idea about apple's internal processes, or what other
>> vendors are following suit).
>
> I think Apple has traditionally been more aggressive than the rest of
> the ecosystem, having completely removed single-DES support a while
> ago and now warning about des3 and rc4.
>
> MIT krb5 is tentatively planning to remove single-DES support in 1.18
> and deprecate triple-DES.  I believe Fedora plans to remove both
> single-DES and triple-DES support in the next release.

That's correct - I'm removing 3DES/1DES wholesale in Fedora 31.  The
change page for that is
https://fedoraproject.org/wiki/Changes/krb5_crypto_modernization , but
it's mostly a re-hash of what's been said above.

Thanks,
--Robbie

--=-=-=
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=1tS3
-----END PGP SIGNATURE-----
--=-=-=--

--===============1581049455034482680==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

--===============1581049455034482680==--

home help back first fref pref prev next nref lref last post