[2929] in Kerberos

home help back first fref pref prev next nref lref last post

About principals' secret keys & attacks

daemon@ATHENA.MIT.EDU (Carlos Horowicz)
Fri Dec 17 12:50:43 1993

From: Carlos Horowicz <carlos@athea.ar>
To: kerberos@MIT.EDU
Date: Fri, 17 Dec 1993 14:19:15 -0300 (ARG)

Hello,
I got a bit confused about the storing of secret keys, and the 
detection of attacks in krb4. Can anybody help ? The questions are:

1. Can the principal's secret key be decrypted, in the case the masterkey
is stolen ?  If the UNIX password crypt algorithm doesn't have a reverse,
is this not a drawback against UNIX passwords ? I mean, in UNIX a user
cannot be faked as far as he/she doesn't own an .rhosts file, am I right ?

2. If an attacker wants to break a principal's secret key, is there any
way to identify the attack, for example, by exceeding some number of 
trials ?

Carlos


home help back first fref pref prev next nref lref last post