[39449] in Kerberos

home help back first fref pref prev next nref lref last post

Re: is there a way to detect if user is using same incorrect password

daemon@ATHENA.MIT.EDU (Ken Hornstein via Kerberos)
Fri Aug 9 21:03:20 2024

Message-Id: <202408100103.47A131bX008296@hedwig.cmf.nrl.navy.mil>
To: Jim Shi <hjshi@yahoo.com>
cc: "kerberos@mit.edu" <kerberos@mit.edu>
In-Reply-To: <887838909.3164322.1723239377924@mail.yahoo.com>
MIME-Version: 1.0
Date: Fri, 09 Aug 2024 21:03:01 -0400
From: Ken Hornstein via Kerberos <kerberos@mit.edu>
Reply-To: Ken Hornstein <kenh@cmf.nrl.navy.mil>
Content-Type: text/plain; charset="utf-8"
Errors-To: kerberos-bounces@mit.edu
Content-Transfer-Encoding: 8bit

>Hi, we have a required to detect  if a client is using same incorrect
>password in in authentication against KDC.  Is it possible the KDC
>server can determine if client is using same incorrect password?  Thanks

Ouch, is this some dang compliance requirement?  I thought I had dealt with
SO MANY weird compliance issues, but that's a new one to me.  I'm interested
in where this is coming from.  If I understand you, it seems like you mean
that a single client is repeating the same incorrect pasword over and over.
If you mean that different clients are trying to use the the same incorrect
password, I don't believe that's possible (nor do I understand why that
would be a requirement).  Upon further thought, this seems like a completely
ridiculous requirement and I cannot imagine why anyone would ask for it.

I _think_, in theory ... my first guess as to what you mean is possible.
But it won't be trivial.  I believe you could accomplish this by using
encryped timestamp preauth, detecting when a wrong password is seen,
remembering that on the KDC, and then sending the same encrypted timestamp
back to the client upon further password requests and detecting if the
response was the same.  That would be a lot of code and have issues if
the requests went to different KDCs.  It's very possible I could be wrong
about that.  And again, that only works with requests from the SAME client
due to password salting.

--Ken
________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos


home help back first fref pref prev next nref lref last post