[1011] in Kerberos

home help back first fref pref prev next nref lref last post

Re: Why is initial user authentication done the way it is?

daemon@ATHENA.MIT.EDU (Steve Lunt)
Fri Jun 15 10:41:30 1990

Date: Fri, 15 Jun 90 09:40:23 -0400
From: Steve Lunt <lunt@ctt.bellcore.com>
To: pit-manager.MIT.EDU!jik@bellcore.bellcore.com
Cc: athena.mit.edu!kerberos@bellcore.bellcore.com

I would add to this list below (arguably most important) that under Unix, /etc/passwd is protected by the Unix access control mechanism, so that Unix may enforce password screening, whereas the Kerberos database is protected by a mechanism which doesn't allow it to know by what password its keys are based.

-- Steve

       Steven J. Lunt         |  lunt@ctt.bellcore.com  |  RRC 1L-213
Computer Security Technology  |-------------------------|  444 Hoes Lane
          Bellcore            |     (201) 699-4244      |  Piscataway, NJ 08854

	From: "Jonathan I. Kamens" <jik@pit-manager.MIT.EDU>

	  First of all, let me reiterate why I still think this is a problem.
	In the description below, "Unix" is short for the tradiitional Unix
	authentication system:

	1. Under Unix, you have to have an account on a properly configured
	   machine in order to get a hole of the passwd file.  Under Kerberos,
	   anyone on the Internet can request an encrypted sample of anyone to
	   bang on it.

	2. Under Unix, every possible password must be encrypted using every
	   possible seed in order to match against strings in the passwd file.
	   Under Kerberos, this isn't necessary -- just run string_to_key over
	   all of your possible passwords and they can immediately be used for
	   decryption attempts.

	3. The crypt() function under Unix is meant to be slow.  Kerberos'
	   decryption of the tgt is faster, significantly.  Furthermore, it's
	   straight DES, so anyone who is serious about cracking passwords can
	   use all of the available DES hardware to do his cracking.

	In summary, it's easier to get a hold of encrypted Kerberos data to
	play with than it is to get a hold of /etc/passwd data, and playing
	with it is faster.


home help back first fref pref prev next nref lref last post