[2932] in Kerberos

home help back first fref pref prev next nref lref last post

Re: About principals' secret keys & attacks

daemon@ATHENA.MIT.EDU (Carlos Horowicz)
Mon Dec 20 16:22:21 1993

From: Carlos Horowicz <carlos@athea.ar>
To: sdawson@engin.umich.edu (Scott Dawson)
Date: Mon, 20 Dec 1993 17:20:19 -0300 (ARG)
Cc: kerberos@MIT.EDU
In-Reply-To: <9312201909.AA04778@limbo.engin.umich.edu> from "Scott Dawson" at Dec 20, 93 02:09:05 pm

> 
> 
> >  > 2. If an attacker wants to break a principal's secret key, is there any
> >  > way to identify the attack, for example, by exceeding some number of 
> >  > trials ?
> >  
> >  Depends how the attacker goes about trying.. The attacker could, in
> >  the kerberos 4 algorithm, request a TGT for a specific
> >  user/service/etc.  and take the data it gets from the KDC offline, and
> >  then tries to break it,m until it finds the appropriate DES key or
> >  passphrase.  Then they can go live again and ask for this same
> >  principal, and they now have the key to open the packet, assuming
> >  the key hasn't been changed.
> 
> I thought that what you get back from Kerberos will be unrecognizable
> when decrypted which would make this type of dictionary attack on the user
> passphrase impossible.  You'd have to actually try to use the ticket and 
> see if it works.
> 
> It's easier if you can sniff traffic of the user you are trying to
> hack because eventually the user will encrypt something which is recognizable 
> (usually in an authenticator).  Then you can chain down from the original TGT 
> to the authenticator and when you get recognizable stuff out you know you've 
> got their key.
> 
> -Scott
> 

1. I think there should be nothing "recognizable" if timestamps and/or random
numbers go in the authenticator.  

2. Under krb5, does the attacker have less possibilities than here, to run
a dictionary of possible passwords and maybe hit the password ?

Carlos


home help back first fref pref prev next nref lref last post