[955] in Kerberos_V5_Development

home help back first fref pref prev next nref lref last post

Re: 3-DES string-to-key algorithm

daemon@ATHENA.MIT.EDU (Richard Basch)
Thu Nov 30 22:29:17 1995

Date: Thu, 30 Nov 1995 22:13:45 -0500
To: "Theodore Ts'o" <tytso@MIT.EDU>
Cc: "Richard Basch" <basch@lehman.com>,
        Bill Sommerfeld <sommerfeld@orchard.medford.ma.us>,
        Mark Eichin	<eichin@cygnus.com>, cvs-krb5@MIT.EDU, krbdev@MIT.EDU
In-Reply-To: <9512010120.AA14269@dcl.MIT.EDU>
From: "Richard Basch" <basch@lehman.com>

On Thu, 30-November-1995, "Theodore Ts'o" wrote to "Richard Basch, Bill Sommerfeld, Mark Eichin, cvs-krb5@MIT.EDU, krbdev@MIT.EDU" saying:

>    Date: Wed, 29 Nov 1995 23:01:23 -0500
>    From: "Richard Basch" <basch@lehman.com>
> 
>    Here is an interesting one... the specification for regular DES
>    string-to-key calls for checking the key to see if it is a (semi)weak
>    key, and XOR the key with 0xF0, if it is.  The implementation does not
>    do this.  I fixed the 3-DES case.
> 
>    Ted, I wanted you to decide whether we fix the 1-DES case.  Since it is
>    statistically improbable that this is being hit, it is probably better
>    to fix it.  Not fixing it will allow the potential compromise of the key
>    and the data the key is trying to protect.
> 
> My proposal would be that we fix it only for the Kerberos V5
> string-to-key algorithm; in other words, in the string-to-key algorithm,
> only do the check and potential XOR if the salt string is non-zero.  The
> chances of our actually hitting a weak or semi-weak key is 1 in 2**52,
> which is relatively low in any case.  
> 
> By only mandating it for V5-style string-to-keys, it means that people
> who are converting over from V4 wouldn't be affected ---- there's only a
> n in 2*52 chance (where n is the number of users) that a site who is
> using V5 kerberos in production would actually be affected by this
> change.  Since there are still many more people using V4 over V5 (at
> least for now), that seems to be the right tradeoff.  
> 
> In addition, it would be pretty simple to write a program that scanned
> through an existing V5 database (or DCE security server database),
> looking for users with weak keys and identify them to the system
> administrator as part of the upgrade process.
> 
> Obviously, this would be a change the krb5 spec, so we'd need to run it
> by the kerberos mailing list and ask for opinions.  But I suspect that
> most people wouldn't object.
> 
> Comments?

Actually, it isn't a change in the spec.  In rfc1510, section 6.3, the
string-to-key algorithm is defined to check for weak/semi-weak keys and
do the XOR.  So, the fix would be bringing the implementation in sync
with the published spec.
-- 
Richard Basch                   URL: http://web.mit.edu/basch/www/home.html
Lehman Brothers, Inc.           Email: basch@lehman.com, basch@mit.edu
101 Hudson St., 33rd Floor      Fax:   +1-201-524-5828
Jersey City, NJ  07302-3988     Voice: +1-201-524-5049


home help back first fref pref prev next nref lref last post