[38975] in Kerberos
Re: heimdal http proxy
daemon@ATHENA.MIT.EDU (Rick van Rein)
Sat Sep 11 14:26:05 2021
Date: Sat, 11 Sep 2021 18:22:48 +0000
From: Rick van Rein <rick@openfortress.nl>
To: Charles Hedrick <hedrick@rutgers.edu>
Message-ID: <20210911182248.GA7118@openfortress.nl>
MIME-Version: 1.0
Content-Disposition: inline
In-Reply-To: <58C9CD4B-C68A-4480-BFD8-29DC38D8C22A@cs.rutgers.edu>
Cc: "kerberos@mit.edu" <kerberos@mit.edu>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: kerberos-bounces@mit.edu
Hello Charles,
> I???d like to be able to use Kerberos SPNEGO at home. Unfortunately the Mac uses Heimdal. 
SPNEGO has really a low security level.  I am surprised this is considered
acceptable for a https proxy.
We are working on two better solutions, with software that classifies only
little over "proof of concept'.
 - TLS-KDH to integrate Kerberos authentication with ECDH encryption;
   this combination is in fact Quantum Proof
   https://datatracker.ietf.org/doc/html/draft-vanrein-tls-kdh
 - HTTP-SASL integrates SASL as a HTTP authentication mechanism, and this
   is meant to allow Kerberos as well.  In contrast with SPNEGO, it would
   be possible to require Channel Binding (at least to the webserver _name_).
   https://datatracker.ietf.org/doc/html/draft-vanrein-httpauth-sasl
Take note: These have not even been proposed on this list, simply due to
lack of time to actively discuss it (been mostly occupied with this and
related implementations).  So at best this could be a future opportunity.
Still, your usecase may help to propell the work forward, so please share
if this would be helpful for your situation.  You may want to pass this
by your sysadmin too.
Cheers,
 -Rick
________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos