[16393] in Kerberos_V5_Development

home help back first fref pref prev next nref lref last post

Re: random to key from password

daemon@ATHENA.MIT.EDU (Sam Hartman)
Mon Sep 27 17:11:55 2010

From: Sam Hartman <hartmans@MIT.EDU>
To: Nicolas Williams <Nicolas.Williams@oracle.com>
Date: Mon, 27 Sep 2010 17:11:38 -0400
In-Reply-To: <20100927205658.GQ9501@oracle.com> (Nicolas Williams's message of
	"Mon, 27 Sep 2010 15:56:59 -0500")
Message-ID: <tsl62xqvqlx.fsf@live.suchdamage.org>
MIME-Version: 1.0
Cc: lha@h5l.org, Russ Allbery <rra@stanford.edu>, krbdev@MIT.EDU
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: krbdev-bounces@MIT.EDU

>>>>> "Nicolas" == Nicolas Williams <Nicolas.Williams@oracle.com> writes:

    Nicolas> On Mon, Sep 27, 2010 at 04:42:14PM -0400, Sam Hartman wrote:
    >> The KDC prefers AES to DES.  So, you'll never be able to use the
    >> DES key for much, but it exists and you can somehow get some text
    >> to attack it.

    Nicolas> How would you get that ciphertext?  
Claim to be a client that only supports DES.  This is a random
key--allowing use as a client is supposed to be reasonable even without
preauth.
_______________________________________________
krbdev mailing list             krbdev@mit.edu
https://mailman.mit.edu/mailman/listinfo/krbdev

home help back first fref pref prev next nref lref last post