[29037] in Kerberos

home help back first fref pref prev next nref lref last post

Re: Is "SPN advertisement" or well-known SPNs a security hole?

daemon@ATHENA.MIT.EDU (Todd Stecher)
Mon Jan 14 18:23:10 2008

Message-Id: <9602FAE2-578A-46A5-8DA9-01A23FAA7D6C@qwest.net>
From: Todd Stecher <tstecher@qwest.net>
To: Srinivas Kakde <srinivas.kakde@yahoo.com>
In-Reply-To: <422369.96913.qm@web46012.mail.sp1.yahoo.com>
Mime-Version: 1.0 (Apple Message framework v915)
Date: Mon, 14 Jan 2008 14:36:31 -0800
Cc: kerberos@mit.edu
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: kerberos-bounces@mit.edu

Once you go down that route (e.g. allowing SPNEGO to specify service  
principal), you no longer have mutual auth, because you no longer are  
connecting to precisely the server the client / client application  
specified.  You could be talking w/ whomever intercepted that traffic,  
and returned their SPN.



On Jan 14, 2008, at 1:57 PM, Srinivas Kakde wrote:

>
> This message says: From a security standpoint, allowing the server  
> to specify its
> service principal is a "bad idea".

________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

home help back first fref pref prev next nref lref last post