[3200] in Kerberos

home help back first fref pref prev next nref lref last post

Re: Ticket cracking (Re: Is there Kerberos for VMS?)

daemon@ATHENA.MIT.EDU (Jon A. Rochlis)
Fri Apr 29 12:33:38 1994

To: ramus@nersc.gov (Joe Ramus)
Cc: kerberos@MIT.EDU
In-Reply-To: Your message of "Wed, 27 Apr 1994 11:09:15 PDT."
             <9404271809.AA27924@windsail.nersc.gov> 
Date: Fri, 29 Apr 1994 12:09:02 -0400
From: "Jon A. Rochlis" <jon@cam.ov.com>

   
   I thought the design of Kerberos 5 prevents the cracking of an encrypted
   ticket.  Or at least makes it a lot more difficult.

One thing that V5 lets you do is require pre-authentication for a
principal, i.e. the princiapl must demonstrate knowledge of its
password/key before it can get an initial ticket. The V5 KDC also will
not issue server tickets for principals which require pre-auth, so you
can't get a ticket for your victim using your own ticket, and do the
previously mentioned off-line attack.  With both of these features you
can then scan the logs for multiple failed pre-auth attempts or modify
the KDC to keep a count and perform some action (such as locking out
the principal or page someone) after too many bad pre-auth attempts.

		-- Jon



home help back first fref pref prev next nref lref last post