[38747] in Kerberos

home help back first fref pref prev next nref lref last post

Re: rdns, past and future

daemon@ATHENA.MIT.EDU (Ken Dreyer)
Wed May 27 14:02:36 2020

MIME-Version: 1.0
In-Reply-To: <9d4eb6d7-2aec-47fb-767a-1f3b0855e331@secure-endpoints.com>
From: Ken Dreyer <ktdreyer@ktdreyer.com>
Date: Wed, 27 May 2020 11:59:46 -0600
Message-ID: <CAD3FbMUzw1z6oCdy=iwk2ODygZD5fEyNp+tqfkFgb+Z-h62qxw@mail.gmail.com>
To: Jeffrey Altman <jaltman@secure-endpoints.com>
Cc: kerberos@mit.edu
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: kerberos-bounces@mit.edu

On Tue, May 26, 2020 at 4:59 PM Jeffrey Altman
<jaltman@secure-endpoints.com> wrote:
>
> On 5/26/2020 6:31 PM, Ken Dreyer wrote:
> > On Tue, May 26, 2020 at 3:58 PM Jeffrey Altman
> > <jaltman@secure-endpoints.com> wrote:
> >>
> >>  2. Before the existence of DNS SRV records, CNAME records were the
> >>     only method of offering a service on multiple hosts.  However,
> >>     its a poor idea to share the same key across all of the hosts.
> >
> > I'm curious about this. What makes it a poor idea?
> >
> > It seems like a very convenient way to scale a service up and down
> > dynamically quickly when you share a key among all instances.
>
> Because if you hack into one of the hosts you now have the key for all
> of the hosts.  The holder of the key can forge tickets for any user.

This is true only if the administrator has enabled constrained
delegation for that key (eg. ok_to_auth_as_delegate) right? Is there
some other scenario I'm missing?

> Since the key isn't unique the entire distributed service has to be
> shutdown to address the vulnerability.

Ok, that makes sense. I was thinking of a homogeneous environment
where each app server runs the exact same versions of code, so an
attacker entry through a vulnerability on one system means that all
systems almost certainly have the same vulnerability.

> It is also much harder to trace where the key was stolen from.

Yeah, that's fair.

- Ken
________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

home help back first fref pref prev next nref lref last post