[2934] in Kerberos

home help back first fref pref prev next nref lref last post

Re: About principals' secret keys & attacks

daemon@ATHENA.MIT.EDU (smb@research.att.com)
Mon Dec 20 18:54:03 1993

From: smb@research.att.com
To: Scott Dawson <sdawson@engin.umich.edu>
Cc: Carlos Horowicz <carlos@athea.ar>, kerberos@MIT.EDU
Date: Mon, 20 Dec 93 18:42:20 EST

	 >  2. Under krb5, does the attacker have less possibilities than here,
	 > to run a dictionary of possible passwords and maybe hit the password?

	 not sure.  I'm not familiar with krb5.

It's been a few years since I looked at it, but the ASN.1 notation can
make life even easier for the attacker.

I personally regard this attack -- requesting TGT's for various
individuals --as the single biggest problem with Kerberos.  I believe
that there's an enhancement to V5 -- and I don't recall if it's an
option or part of the basic protocol -- to provide for
preauthentciation of the TGT request.  That's a very important change.

home help back first fref pref prev next nref lref last post