[EMAIL PROTECTED] (Ian Downard) writes:

>> Here's a quote from Tom Wu's paper 
>> (http://theory.stanford.edu/~tjw/krbpass.html):
>> 
>> "While this is an improvement relative to Kerberos V4, an attacker
>> with a network sniffer can still carry out the same off-line
>> dictionary attack against any authentication requests captured over
>> the network [9]."
>> 
>> In addition, I sniffed the initial authentication packets with ethereal on
>> my Linux network, and I see one of the datagrams is sending the
>> Pre-Authentication via "PA-ENC-TIMESTAMP".  Pretty neat, but how does it
>> encrypt the timestamp?  It must be using a key which is known by the
>> Kerberos server (otherwise, how would it decrypt)?  And if it is using the
>> user's password (even before getting a TGT), how does that resist password
>> guessing attacks?

With preauth, you can only attack a password if you can sniff the
network the user or kdc is on to get the encrypted padata.  Without
preauth, you can simply ask the KDC to give you the ciphertext to
attack.  As the quote from Tom Wu's paper points out, this is an
improvement relative to kerberos v4.  Nobody ever claimed it was a
panacea.  That would require the USPTO to get a clue when issuing
software patents :-/

I do not speak for the MIT kerberos team, but I'm sure the MIT
kerberos team would happily accept patches which fixed this problem
(using EKE, SPEKE, SRP, whatever), if it also came with an appropriate
patent license....

                Marc
_______________________________________________
Kerberos mailing list
[EMAIL PROTECTED]
http://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to