[16312] in Kerberos_V5_Development

home help back first fref pref prev next nref lref last post

Re: wrong checksum type for arcfour-hmac-md5

daemon@ATHENA.MIT.EDU (Greg Hudson)
Thu Sep 16 12:39:37 2010

From: Greg Hudson <ghudson@mit.edu>
To: Luke Howard <lukeh@padl.com>
In-Reply-To: <90FF5655-AA74-4C72-845C-57CE87A435F3@padl.com>
Date: Thu, 16 Sep 2010 12:39:32 -0400
Message-ID: <1284655172.5992.1737.camel@ray>
Mime-Version: 1.0
Cc: "krbdev@mit.edu Dev List" <krbdev@mit.edu>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: krbdev-bounces@mit.edu

On Thu, 2010-09-16 at 12:21 -0400, Luke Howard wrote:
> Here we have to balance security against interoperability. Is it
> possible to get the third-party server fixed?

I don't think there's a security issue here; the authenticator checksum
doesn't need to be keyed.  The question is what the fix looks like:

1. Samba uses a proper GSSAPI checksum in its homegrown GSSAPI code.
This is the ideal fix, but might be too difficult.

2. Samba uses krb5_auth_con_set_req_cksumtype() to cause an MD5 checksum
to be used when the enctype is RC4.

3. MIT krb5 switches to using MD5 checksums with RC4 keys in
authenticators only.

The downside of (3) is that it's extra complexity in our code base for
the sake of an improper use case (Samba using regular AP-REQ checksums
in a GSSAPI AP-REQ).  The upside is that it makes us consistent with
Heimdal and MS clients.


_______________________________________________
krbdev mailing list             krbdev@mit.edu
https://mailman.mit.edu/mailman/listinfo/krbdev

home help back first fref pref prev next nref lref last post