[30037] in Kerberos

home help back first fref pref prev next nref lref last post

Re: Question about dns_lookup_realm and domain_realm

daemon@ATHENA.MIT.EDU (Ken Raeburn)
Fri Jun 27 11:33:33 2008

From: Ken Raeburn <raeburn@MIT.EDU>
To: Simo Sorce <ssorce@redhat.com>
In-Reply-To: <1214579831.3822.276.camel@localhost.localdomain>
Message-Id: <B25978A4-5510-461C-8127-28AB4F847251@mit.edu>
Mime-Version: 1.0 (Apple Message framework v924)
Date: Fri, 27 Jun 2008 11:32:28 -0400
Cc: kerberos@MIT.EDU
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: kerberos-bounces@MIT.EDU

On Jun 27, 2008, at 11:17, Simo Sorce wrote:
> this statements is interesting, how are TXT records "insecure" ?

If a forged TXT RR is received, the client may be told the server is  
in a different realm.  That realm may have been compromised by an  
attacker, and cross-realm authentication to it may be possible  
(especially if and when we get something PKINIT-like deployed).  So  
the client can "successfully" authenticate to host/server.foo.com@BLACK-HATS.TLD 
, and never know that that's not the principal it should be  
authenticating to for server.foo.com.

> Isn't "validation" all about verifying the KDC is one we can really
> trust by using a trusted secret ?

Cross-realm authentication and the possibility of compromised  
"neighbor" realms makes it much more complicated.

> How is local configuration data trustworthy given that to resolve  
> names
> to IPs we still rely on DNS ?

Trusting address records from DNS, but not trusting DNS at all for  
authentication purposes, would mean the attacker could get the client  
to connect to server.black-hats.tld, but it would try authenticating  
to the originally intended service principal; since the black hats  
don't have the service key, it would fail, and the client should  
disconnect.  It's a denial of service, but not a transparent spoofing  
of the service.

> Do we have information on which clients support referrals ?

Current Microsoft and MIT clients do, I wouldn't be surprised if  
Heimdal does as well.

> And are they implemented in MIT KDC (and how) ?

Not yet.  A basic implementation (using the domain_realm mapping from  
the KDC's config files) is currently on my plate.

Ken
________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

home help back first fref pref prev next nref lref last post