[37632] in Kerberos

home help back first fref pref prev next nref lref last post

Re: Kerberos and HTTP / HTTPS - Could Kerberos tickets be intercepted

daemon@ATHENA.MIT.EDU (Rick van Rein)
Tue Aug 23 10:25:54 2016

Message-ID: <57BC5C81.7000506@openfortress.nl>
Date: Tue, 23 Aug 2016 16:24:01 +0200
From: Rick van Rein <rick@openfortress.nl>
MIME-Version: 1.0
To: "'kerberos@mit.edu'" <kerberos@mit.edu>
In-Reply-To: <1471956864.8163.11.camel@redhat.com>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: kerberos-bounces@mit.edu

Hi,

> The HTTP/Negotiate protocol unfortunately does not prevent replay
> attacks, so It can be done if the other endpoint does not use a replay
> cache.
>
HTTP/Negotiate is indeed so sad that we've been working on an
alternative, that is to integrate Kerberos + Diffie-Hellman into TLS. 
Then, once you get TLS going for your HTTPS, you would have established
mutual trust and perfect forward secrecy.

This is work in active progress:
 - we're removing the last bugs from the GnuTLS-extension on
http://github.com/arpa2/gnutls-kdh
 - we hope to integrate the KDH branch into the TLS Pool soon from
https://github.com/arpa2/tlspool/tree/tls-kdh
 - we're preparing a HTTPS proxy on
https://github.com/arpa2/tlspool/blob/master/tool/https_proxy.py
 - we've got a generic TLS wrapper on
https://github.com/arpa2/tlspool/blob/master/tool/tlstunnel.c
 - we'll soon release a successor to
https://tools.ietf.org/html/draft-vanrein-tls-kdh-04

We also have plans for automatic realm crossover including client
identity pseudonymity.

But, alas, this is not ready to roll out yet.  We're still finishing the
work as we speak.


Cheers,

Rick van Rein
for the InternetWide.org / ARPA2.net project

________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

home help back first fref pref prev next nref lref last post