[5912] in Kerberos

home help back first fref pref prev next nref lref last post

Re: Should I restrict 'kinit' access

daemon@ATHENA.MIT.EDU (Kenneth D. Renard" (ACISD))
Sat Sep 23 11:07:13 1995

Date:     Sat, 23 Sep 95 10:52:02 EDT
From: "Kenneth D. Renard" (ACISD) <kdrenard@ARL.MIL>
To: gaskell@dstc.edu.au, kerberos@MIT.EDU
Cc: adt@ARL.MIL, hpc-kerberos@ARL.MIL

On 17 Sep 1995, gaskell@dstc.qut.edu.au wrote:

> That is one of our concerns with the first stage of the Kerberos 
> protocols.  Anyone can get an initial TGT for anyone else, just 
> supposedly they cannot decrypt it, since they don't have the password.  
> To this end, we have designed a system with challenge/response protocols 
> to avoid this threat.  We think that the pre-authentication system may 
> also bring in some scalibility or manageability problems.  One of our 
> options uses Public-key crypto and another a zero knowledge proof.  All 
> use smart cards.  Look out for a paper or two, after our prototype works.


The Army Research Lab has been investigating similar mechanisms.  The "latest
and greatest" of which involves public key cryptography and one-time-password
(OTP) generators.  We pulled the rsaref library out of PGP and integrated
SecurID cards for this project.  Here is a brief synopsis of the transactions:

AS_REQ generation on client (i.e. kinit):

	Generate a random DES key
	Client gets OTP from user
	Encrypt DES key and OTP in public key of the realm's KDC
	Sends this message in preauthentication field
	Save random DES key to use for decryption

AS_REQ receipt on KDC:
	
	Decrypt preauth message with private key of KDC
	Extract client-generated random DES key
	Extract and verify OTP (only a yes or no answer is required)

AS_REP generation:

	Create normal TGT message
	Encrypt in client-generated random DES key
	Send back to client

AS_REP receipt:

	Decrypt response with saved DES key.


Advantages:
	Rather simple to implement.
	Key used to encrypt AS_REP is randomly generated and likely stroger
		than hashed password.  AS_REP decryption brute force attack
		success rate severely dimished.
	OTP is only authentication token required.  No static passwords.
		This is important for unencrypted remote authentication via
		untrusted networks.


Disadvantages:
	Non-standard preauth-type required.
	More powerful KDC required to handle public key decryption.
	

Current Status:
	Prototype KDC is running. [Kerberos V Beta 5]
	Support for second OTP exchange exists (to re-sync SecurID cards).
		This can also be generalized to a challenge-response type
		of system.
	Should completely incorporate RSA as encryption type.
	Need to use ASN.1 encoding of messages for portability.
	If there is enough interest, generalize OTP interface.

-Ken Renard
Army Research Lab
APG, MD

home help back first fref pref prev next nref lref last post