| home | help | back | first | fref | pref | prev | next | nref | lref | last | post |
X-Envelope-From: jaltman@secure-endpoints.com X-MDaemon-Deliver-To: krbdev@mit.edu Message-ID: <4D8CEB8E.8020402@secure-endpoints.com> Date: Fri, 25 Mar 2011 15:22:54 -0400 From: Jeffrey Altman <jaltman@secure-endpoints.com> MIME-Version: 1.0 To: krbdev@mit.edu In-Reply-To: <1300985060.10465.28.camel@t410> Reply-To: jaltman@secure-endpoints.com Content-Type: multipart/mixed; boundary="===============0410272541==" Errors-To: krbdev-bounces@mit.edu This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --===============0410272541== Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="------------enigDCDD22A88454AC7CF86C464C" This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enigDCDD22A88454AC7CF86C464C Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable On 3/24/2011 12:44 PM, Greg Hudson wrote: > I want to hear from Sam and/or Ken before making a decision, but here's= > what I can tell from a bit of research: >=20 > * Weak key checks have been in our code since it appeared in our tree i= n > October 2001. The code was committed by Sam but was probably written b= y > someone else.=20 The code in MIT Kerberos was written by David Cross <crossd@cs.rpi.edu>. The implementation for Heimdal which does not contain RC4 weak key checks was written by Luke Howard. I can find no evidence that Microsoft Kerberos SSP performs weak key checks. Perhaps the consortium can obtain an explicit answer from Microsoft. > I wasn't able to find any discussion of RC4 weak keys on > the lists, although I could easily have missed it. I have found no discussions on either krbdev or the ietf working group mailing list. The Informational RFC was published as an individual submission. As far as I can tell there was no comparison of the RFC submission with the MIT implementation prior to publication. There certainly was no discussion on the kerberos wg list. > * The weak key checks are probably based on > http://impic.org/papers/WeakKeys-report.pdf appendix A. Sure. The keys match. > * The attack based on these weak keys reduces the search space by 11 > bytes, and requires about 2^26 messages with known plaintexts to succee= d > with 50% probability. >=20 > * The use of confounders in rc4-hmac appears to foil this attack, > although I can't say that with high confidence. >=20 > If the attack is not foiled by confounders, it's pretty bad for > rc4-hmac-exp (you get a 2^53 work factor to recover a key after scannin= g > about 61 million messages with known plaintexts) but isn't very > interesting for rc4-hmac; 2^117 is still a very high work factor for an= > attack on a legacy enctype. My reading of the security considerations section of 4757 is that a new key is generated for each message transmitted using the gss context in order to address the key weakness. However, the statements are far from explicit. > I agree that simply erroring out on weak keys without any standards > support for avoiding them is not a great solution, especially when one > in 2^24 keys is weak. The way the code exists today RC4-HMAC is not a usable enc-type in combination with GSS when one side of the connection is MIT. Recommending that RC4-HMAC not be used is not practical in an AD centric environment. Jeffrey Altman Secure Endpoints, Inc. --------------enigDCDD22A88454AC7CF86C464C Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (MingW32) iQEcBAEBAgAGBQJNjOuQAAoJENxm1CNJffh4opMIAN4Sn+W1ZEK/BIcJDdPZPiHc hlyah8/sea2RUJB9bsoozodzhfADT8IWyVR1iGaNjmXlsjjGNGN/g75KxfQvtfU7 X4xDwSKMWMa+/TPi6aP0qRTljTIJtpf2TjOwXLdQqnn2bnJApCohFiZz1lYFIBPg f6rta7ZgL6bK1le0bUnr5fWzPnPrIszPcTVbbmSUTd/idCmtvXbkHdDklh5MFPXM KIQr3tOxzJuI4HiQkMmNzSuFtF86LVv10Qu1MbB0nv1SXa4kU90ohu3wW1fKTtqn ZBg2MyqSiIrtgDuZAegl15wRREqD6ZpPirAZIhonVZ4H0j3Y2dE3cMoqVCICkVU= =sVsu -----END PGP SIGNATURE----- --------------enigDCDD22A88454AC7CF86C464C-- --===============0410272541== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline _______________________________________________ krbdev mailing list krbdev@mit.edu https://mailman.mit.edu/mailman/listinfo/krbdev --===============0410272541==--
| home | help | back | first | fref | pref | prev | next | nref | lref | last | post |