[37852] in Kerberos

home help back first fref pref prev next nref lref last post

Re: PKINIT with PA-PK-AS-REQ_OLD fails with ASN1_CHECK_TLEN:wrong tag

daemon@ATHENA.MIT.EDU (Jacques Henry)
Thu Feb 2 11:13:47 2017

MIME-Version: 1.0
In-Reply-To: <e5d07eb6-6bac-0db3-e1b3-b8246248f415@mit.edu>
From: Jacques Henry <caramba696@gmail.com>
Date: Thu, 2 Feb 2017 12:04:44 +0100
Message-ID: <CAMiydLnbauh1x2qc4xi6W1umcePN0urpMF4A1stn6AkX8A1xJw@mail.gmail.com>
To: Greg Hudson <ghudson@mit.edu>
Cc: kerberos@mit.edu
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: kerberos-bounces@mit.edu

>
> 1. The old draft9 support isn't intended to be used as a wrong-PIN
> fallback; it is only there for interoperability with old PKINIT
> implementations.  It might be time to remove that support, since Windows
> Server 2003 hit the end of its extended support life in 2015.
>

When talking to the draft9 are you referring to this?
https://tools.ietf.org/html/draft-ietf-cat-kerberos-pk-init-09

Indeed, I don't understand this fallback for a wrong PIN.
We have mainly 2008R2 and 2012R2 and soon 2016.
Keeping a Server 2000/2003 compatibility is another debate.


> 2. We can't decode the Windows PKINIT reply due to some ASN.1 tagging
> issue.
>
> To debug the second problem, I would need a packet capture of the AS-REP
> from the Windows KDC.  But it's also not likely to be a high priority
> for me because of the first issue, so if it isn't convenient to get that
> information, it probably isn't worth a lot of effort.
>

You would need the raw AS-REP packet from Wireshark?

I have activated the DEBUG_ASN1 flag so I get up with the following file:
/tmp/client_received_pkcs7_signeddata

Indeed OpenSSL complains about this file
# openssl pkcs7 -in /tmp/client_received_pkcs7_signeddata -inform der
unable to load PKCS7 object
140362212865696:error:0D0680A8:asn1 encoding routines:ASN1_CHECK_TLEN:wrong
tag:tasn_dec.c:1338:
140362212865696:error:0D07803A:asn1 encoding
routines:ASN1_ITEM_EX_D2I:nested asn1 error:tasn_dec.c:390:Type=PKCS7

using the asn1parse command print the structure but I don't want to
copy/paste all the output here.

Thanks.
________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

home help back first fref pref prev next nref lref last post