[29083] in Kerberos
Re: Is "SPN advertisement" or well-known SPNs a security hole?
daemon@ATHENA.MIT.EDU (Simon Wilkinson)
Thu Jan 17 16:59:18 2008
In-Reply-To: <349827.43320.qm@web46008.mail.sp1.yahoo.com>
Mime-Version: 1.0 (Apple Message framework v753)
Message-Id: <1AA58B10-D76C-4FC3-86C3-C65628DBF2BA@sxw.org.uk>
From: Simon Wilkinson <simon@sxw.org.uk>
Date: Thu, 17 Jan 2008 09:44:12 +0000
To: Srinivas Kakde <srinivas.kakde@yahoo.com>
Cc: kerberos@mit.edu
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: kerberos-bounces@mit.edu
On 16 Jan 2008, at 21:32, Srinivas Kakde wrote:
> I
> think there must be equivalence between permission required create a
> principal on
> a KDC and the permission required associate the service principal
> name
> with network binding information. I think this is an interesting area
> of study.
See the domain based naming work being done in the IETF Kitten WG -
this allows the KDC to associate a specific SPN with a domain-based-
name.
> Attacker that is able obtain control of a KDC or cross-realm keys will
> be able to cause very serious problems
The second part of this isn't strictly true. An attacker than
compromises a KDC that you cross-realm with, or the keys for that
cross-realm relationship, can only impersonate principals in the
foreign realm. Normally, this doesn't have any significant impact on
the overall security of local services, providing there's no way for
an attacker to pretend that a local service has an SPN in that
foreign realm. This is the attack that Jeff was describing.
Simon.
________________________________________________
Kerberos mailing list Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos