[6979] in Kerberos

home help back first fref pref prev next nref lref last post

Re: kerberos security

daemon@ATHENA.MIT.EDU (Sam Hartman)
Tue Apr 2 00:33:40 1996

To: mxer@kauri.vuw.ac.nz (Frank Jansen)
Cc: kerberos@MIT.EDU
From: Sam Hartman <hartmans@MIT.EDU>
Date: 02 Apr 1996 00:16:25 -0500
In-Reply-To: mxer@kauri.vuw.ac.nz's message of 2 Apr 1996 04:10:48 GMT

mxer@kauri.vuw.ac.nz (Frank Jansen) writes:

> 
> Greetings,
>           How secure are the session keys for kerberos V4 and V5 ? I hear that
> DES , the encryption algorithm used by kerberos, is becoming vulnerable. Is 
> there an alternative available and usable in kerberos that will hold up 
> better ? Thanks in advance.

	No one has publically demonstrated they have broken DES yet.
However, it wouldn't surprise me if it happened in a year or three.

	There is no solution for Kerberos4.  MIT's next version of
Kerberos5 will likely support tripple-DES for most aspects of the
protocol.  (Almost all the code is already written.)

	Unfortunately, MIT's Kerberos5 cannot be exported from the
United States.  You will have to wait for someone to implement
Kerberos5 outside the US in order to get a legal copy.

  >
> -- > Frank Jansen, frank.jansen@vuw.ac.nz , Phone: +64 4 4965416 >
Information Technology Services, * * Fax: +64 4 4715386 > Victoria
University of Wellington, | > P.O. Box 600, Wellington, New Zealand.
\___/ Callsign: ZL2TTS

home help back first fref pref prev next nref lref last post