[32760] in Kerberos

home help back first fref pref prev next nref lref last post

Re: Question on mutual authentication

daemon@ATHENA.MIT.EDU (Greg Hudson)
Sat Oct 2 07:44:18 2010

From: Greg Hudson <ghudson@mit.edu>
To: SANDERS Miguel <miguel.sanders@arcelormittal.com>
In-Reply-To: <7DF29B50FFF41848BB2281EC2E71A206016D9809@GEN-MXB-V04.msad.arcelor.net>
Date: Sat, 02 Oct 2010 07:44:10 -0400
Message-ID: <1286019850.20521.1204.camel@ray>
Mime-Version: 1.0
Cc: "kerberos@mit.edu" <kerberos@mit.edu>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: kerberos-bounces@mit.edu

On Sat, 2010-10-02 at 05:01 -0400, SANDERS Miguel wrote:
> I have a question concerning the mutual authentication in the kerberos
> flow. I know that the client proves his identity to the AS by using
> the PA-ENC-TIMESTAMP (preauthentication). Similarly, the authenticator
> in the TGS-REQ is used to prove the client's identity to the TGS. But
> how does the AS prove his identity to the client in the AS-REP
> message? Same question for the TGS in the TGS-REP message.

The AS or TGS (which are typically just referred to as the KDC) doesn't
exactly prove its identity; it proves its knowledge of the client's
long-term key.  If the fake KDC does not know the client's long-term key
(or TGT session key for a TGS request), it will be unable to produce a
reply which successfully decrypts.

It's important to note that when a user is logging into a host, this
standard of proof is of no value to the host, as the user could be
colluding with a fake KDC.  This is the classic "Zanarotti attack."  To
prevent this attack, a host makes the KDC prove its knowledge of the
long-term key in the host's keytab, by making a TGS request to that
service principal and verifying the result.


________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

home help back first fref pref prev next nref lref last post