[16788] in Kerberos_V5_Development
Re: GSS MIC problems between Unix and Windows
daemon@ATHENA.MIT.EDU (Greg Hudson)
Tue May 3 13:01:52 2011
From: Greg Hudson <ghudson@mit.edu>
To: Nico Williams <nico@cryptonector.com>
In-Reply-To: <BANLkTinQuxGgccrovZ5Q-0-xt7s0CO08kw@mail.gmail.com>
Date: Tue, 03 May 2011 13:01:20 -0400
Message-ID: <1304442080.2034.51.camel@t410>
Mime-Version: 1.0
Cc: "krbdev@mit.edu" <krbdev@mit.edu>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: krbdev-bounces@mit.edu
On Tue, 2011-05-03 at 11:01 -0400, Nico Williams wrote:
> This is almost certainly the RC4 interoperability bug in MIT krb5
> recently reported by Jeff Altman. Search the list archives for
> details.
I don't think so. The RC4 weak key interoperability issue would strike
once in millions of generated keys--often enough to cause a problem for
protocols which wrap lots of messages in the course of operation, but
only vanishingly rarely for SSH.
Unfortunately, I don't know what's wrong and don't know a good way to
pursue the problem. I might be able to explain why native 1.7.1
generates a different format of MIC: 1.7 added support for enctype
negotiation during the AP-REQ/AP-REP exchange, so it may have negotiated
an AES subkey.
_______________________________________________
krbdev mailing list krbdev@mit.edu
https://mailman.mit.edu/mailman/listinfo/krbdev