[36170] in Kerberos

home help back first fref pref prev next nref lref last post

Re: signing-key for AD-KDC-ISSUED

daemon@ATHENA.MIT.EDU (Greg Hudson)
Tue Jun 3 10:52:20 2014

Message-ID: <538DE114.1010602@mit.edu>
Date: Tue, 03 Jun 2014 10:52:04 -0400
From: Greg Hudson <ghudson@mit.edu>
MIME-Version: 1.0
To: Peter Mogensen <apm@one.com>, kerberos@mit.edu
In-Reply-To: <538D875B.6010909@one.com>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: kerberos-bounces@mit.edu

On 06/03/2014 04:29 AM, Peter Mogensen wrote:
> This seems to be conflicting. First it says the signing-key is the 
> session-key, then it says it's the service-key used to encrypt the ticket.

I don't think AD-KDC-issued is really used much, but to the extent that
we have client code for it, we (MIT krb5) assume the ticket session key
is used to sign it.  I don't see any Heimdal code for AD-KDC-issued
except for an #if 0 block, and I don't think Microsoft uses it for
anything since they have the PAC.

> Using the service-key seems to make more sense and it's also what I can 
> see the draft for AD-CAMMAC uses for svc-verifier.

>From a security perspective, I don't think it really matters whether the
ticket session key or the service key is used.  The former provides a
slightly more direct guarantee that the authdata originated with the
specific ticket it is included in, but anyone with the service key can
print up a complete ticket with a chosen session key, so it shouldn't
matter either way.
________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

home help back first fref pref prev next nref lref last post