[16389] in Kerberos_V5_Development

home help back first fref pref prev next nref lref last post

random to key from password

daemon@ATHENA.MIT.EDU (Sam Hartman)
Mon Sep 27 16:04:46 2010

From: Sam Hartman <hartmans@mit.edu>
To: Russ Allbery <rra@stanford.edu>
Date: Mon, 27 Sep 2010 16:04:32 -0400
In-Reply-To: <87y6ant0qd.fsf@windlord.stanford.edu> (Russ Allbery's message of
	"Mon, 27 Sep 2010 13:01:14 -0700")
Message-ID: <tsllj6nuf5b.fsf_-_@live.suchdamage.org>
MIME-Version: 1.0
Cc: lha@h5l.org, krbdev@mit.edu,
   Nicolas Williams <nicolas.williams@oracle.com>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: krbdev-bounces@mit.edu

>>>>> "Russ" == Russ Allbery <rra@stanford.edu> writes:

    Russ> Nicolas Williams <Nicolas.Williams@oracle.com> writes:
    >> I'm saying it's what it should do.  I.e., the kadmin/kadm5 client
    >> should be modified to randomize keys by doing a cpw with a
    >> randomized password.

    Russ> If you made this change globally (rather than making it an
    Russ> option, such as in Heimdal), then it would apply to
    Russ> keytab-only principals such as host/* keys as well.  Do we
    Russ> lose any security benefit from having all the enctypes have
    Russ> independent keys the way that we get now with -randkey?  (Or
    Russ> at least I always assumed we got that now; maybe we don't?)

Hmm.
Possibly.
If one of the string2key functions is easier to preimage than another,
then you could potentially find one of the stronger keys more easily.

That could be an issue in a case such as encryption of server tickets
where the KDC would not actually use the weaker enctype.
_______________________________________________
krbdev mailing list             krbdev@mit.edu
https://mailman.mit.edu/mailman/listinfo/krbdev

home help back first fref pref prev next nref lref last post