[585] in Kerberos

home help back first fref pref prev next nref lref last post

central password checking

daemon@TELECOM.MIT.EDU (Mark Lillibridge)
Tue Jan 10 13:09:51 1989

From: Mark Lillibridge <chariot@ATHENA.MIT.EDU>
To: Saltzer@ATHENA.MIT.EDU
Cc: sms-dev@ATHENA.MIT.EDU, kerberos@ATHENA.MIT.EDU
In-Reply-To: Jerome H. Saltzer's message of Mon, 9 Jan 89 13:29:02 EST <8901091829.AA09479@HERACLES.MIT.EDU>
Reply-To: chariot@ATHENA.MIT.EDU


>   The scenario Mark describes presents a problem, but I believe that
>   his problem is quite orthogonal to central password quality control.

>   If my password is compromised, and I try to change it with a network
>   message, I will be subject to the attack Mark describes, whether or
>   not Kerberos wants me to send the new password for quality checking.
>   The reason is that Kerberos must receive at least the key form (after
>   running string-to-key over the password).  The key form would go
>   across the net, encrypted in a way knowable by anyone who knows my
>   old password (and who has monitored the entire password-changing
>   conversation between me and Kerberos).  Such an intruder could read
>   the new key field and use the information to acquire my credentials.

	Opps!  Objection withdrawn.

							- Mark

home help back first fref pref prev next nref lref last post