[5638] in Kerberos

home help back first fref pref prev next nref lref last post

Re: SSL as Kerb replacement?

daemon@ATHENA.MIT.EDU (Donald T. Davis)
Wed Aug 9 09:12:44 1995

To: bkelley@cup.hp.com (Bob Kelley)
Cc: kerberos@MIT.EDU
In-Reply-To: Your message of "08 Aug 1995 21:01:34 GMT."
             <408jbe$l8a@hpindda.cup.hp.com> 
Date: Wed, 09 Aug 1995 09:03:54 -0400
From: "Donald T. Davis" <don@cam.ov.com>

bob kelley writes:
> Have any of you thought about using SSL-ized applications
> (telnet, ftp, etc) instead of kerberized applications?  I
> got the SSLeay library and ftp/telnet/httpd and was quite
> impressed by them vs kerberized apps.  No KDC required!

ssl is insecure on several counts:

* it doesn't require the application client to
  authenticate himself.
* it cannot assure the appl server that the client-
  generated session-key is fresh and randomly-generated.
  netscape's key-generating prng is particularly weak.
* it's vulnerable to a man-in-the-middle attack, because
  there is no way for the user to authenticate his top-
  level certification authority keys.

kerberos is invulnerable to these weaknesses.

i presented the man-in-the-middle attack in a paper at
the 1st usenix workshop on electronic commerce, which
was held in manhattan last month.  the proceedings are
in press now, and will be out soon.

				-don davis, boston

home help back first fref pref prev next nref lref last post