[1024] in Kerberos

home help back first fref pref prev next nref lref last post

Re: Dictionary attacks

daemon@ATHENA.MIT.EDU (Jon C. R. Bennett)
Fri Jun 15 20:02:21 1990

Date: 15 Jun 90 22:08:57 GMT
From: jb7m+@andrew.cmu.edu  (Jon C. R. Bennett)
To: kerberos@ATHENA.MIT.EDU


	
> In article <UaSBcy=0Bww25YSmBx@transarc.com> Ted_Anderson@TRANSARC.COM writes:
> 
> I believe that the confounder was introduced to (surprisingly) confound
> this attack. The confounder is a random number at the beginning of the
> encrypted packet, thus removing the possibility for the attack above.
> 
> wes

you better make sure that the (psudo)random number generator you are using
is REALY good, if not, all you are doing is effectivly give the attacker
more cleartext to play with!

in general having the server send the ticket back encrypted in the users
key in reponse to any request is bad simply because it gives away
information with can be used in an attack, forcing the client to send the
request encrpted in the users key (where the request can be time stamped
to prevent reuse by someone with access to the subnet and have a random
number appended to the front to hinder stream encrypted DES attacks)
prevents the release of more information then necessary.

jon

home help back first fref pref prev next nref lref last post