[16714] in Kerberos_V5_Development

home help back first fref pref prev next nref lref last post

Re: Automatically randomizing principal keys (in preauth plugin)

daemon@ATHENA.MIT.EDU (Luke Howard)
Wed Mar 23 07:59:32 2011

Mime-Version: 1.0 (Apple Message framework v1084)
From: Luke Howard <lukeh@padl.com>
In-Reply-To: <x8q7hbqcawx.fsf@mantis.cs.huji.ac.il>
Date: Wed, 23 Mar 2011 22:58:23 +1100
Message-Id: <242BDF49-BB2A-4D8A-A5FE-EE42A39199B8@padl.com>
To: Yair Yarom <irush@cs.huji.ac.il>
Cc: krbdev@mit.edu
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: krbdev-bounces@mit.edu

> My problem is with the krbPrincipalKey. If it's missing or empty, the
> kdc won't authorize the user (even though the preauth succeeded). So as
> I see it I have two basic options (besides using kadmin):
> 
> 1. Have the preauth plugin check if there's a key available, and if not
>   create a random one and insert it into the database. Is this
>   possible? If so how and where in the plugin should I do it?
> 
> 2. Have all users have the same static (random) key. Here the question
>   is how insecure is it? i.e. I force the use of my preauth plugin as
>   it's the only one installed that provides HW authentication
>   (allegedly). So is this key actually used anywhere?
> 
> Any other suggestion would be appreciated.


What about fixing the real problem, which appears to be that the KDC (or KDB library) requires the user to have a key?

(True this won't work if you can't recompile the KDC.)

-- Luke
_______________________________________________
krbdev mailing list             krbdev@mit.edu
https://mailman.mit.edu/mailman/listinfo/krbdev

home help back first fref pref prev next nref lref last post