[16730] in Kerberos_V5_Development

home help back first fref pref prev next nref lref last post

Re: RC4 Weak Key checks

daemon@ATHENA.MIT.EDU (Ken Raeburn)
Fri Mar 25 16:13:06 2011

Mime-Version: 1.0 (Apple Message framework v1082)
From: Ken Raeburn <raeburn@mit.edu>
In-Reply-To: <4D8CEB8E.8020402@secure-endpoints.com>
Date: Fri, 25 Mar 2011 16:12:59 -0400
Message-Id: <033F0D69-2269-4DC7-AC61-7E69A4806003@mit.edu>
To: jaltman@secure-endpoints.com
Cc: krbdev@mit.edu
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: krbdev-bounces@mit.edu

On Mar 25, 2011, at 15:22, Jeffrey Altman wrote:
> I can find no evidence that Microsoft Kerberos SSP performs weak key
> checks.  Perhaps the consortium can obtain an explicit answer from
> Microsoft.

I think this is key.  The "spec" is documentation of How Windows Does Things, and AFAIK the main use of RC4 with MIT Kerberos is for Windows compatibility, so that's where we should be looking to clarify this.  If they do weak key checks -- either rejecting them or adjusting keys to avoid them -- then the RFC ought to be updated; if they don't, then for compatibility perhaps MIT shouldn't either.  (And if it's really a big security problem -- as I suspect it actually was *not* for DES weak keys given how we use DES -- then that's an argument for deprecation of RC4.)

Ken
_______________________________________________
krbdev mailing list             krbdev@mit.edu
https://mailman.mit.edu/mailman/listinfo/krbdev

home help back first fref pref prev next nref lref last post