[37641] in Kerberos
Re: Kerberos and HTTP / HTTPS - Could Kerberos tickets be intercepted
daemon@ATHENA.MIT.EDU (Rick van Rein)
Wed Aug 24 19:09:56 2016
Message-ID: <57BE2920.2080307@openfortress.nl>
Date: Thu, 25 Aug 2016 01:09:20 +0200
From: Rick van Rein <rick@openfortress.nl>
MIME-Version: 1.0
To: Simo Sorce <simo@redhat.com>
In-Reply-To: <1472069172.8163.98.camel@redhat.com>
Cc: kerberos <kerberos@mit.edu>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: kerberos-bounces@mit.edu
Hey,
>> To be clear, the whole point of what I'm proposing is that the client
>> would have ZERO dependencies. Being able to do proper auth and then
>> get a TLS session that uses the crypto context established during auth
>> instead of traditional certificate would be a big deal.
The general idea of IAKERB is that client-KDC traffic can travel over an unprotected link, which might involve the server. It is still important however, to have the long-term secret (the "password") established between client and KDC to base the trust on. That is not the pre-shared key scheme that I thought you were heading for.
>> I don't see why giving the server access to the TGT would be any
>> different from delegation. It could be "constrained" to just the HTTP
>> server(s), Sharepoint, or whatever stuff requires impersonation.
>
> Constrained delegation can be done without forwarding one's TGT.
Careful though -- constrained delegation as done by Microsoft's S4U2Self / S4U2Proxy can only be used within one realm -- because the server is supposed to confine itself to the limitations setup (but not enforced) by the client realm. This IMHO is a severe limitation on that particular model of constrained delegation.
> Forwarding a TGT is bad because it is unbounded impersonation.
Only when the corresponding key is supplied alongside! [I hope I'm not taking anything out of context by saying that, I'm not sure about that but will probably be corrected if I am.]
-Rick
________________________________________________
Kerberos mailing list Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos