Armor key negotiation in FAST

Simon.Jansen@t-systems.com Simon.Jansen at t-systems.com
Mon Nov 12 05:37:57 EST 2012


Hi,

I have a further question referring to the following part of the previous conversation.

>> So the security of the whole tunnel is based on the strength of the long-term host key.
>
>Yes.

Why is the armor built and why don't they use simply the long-term key of the host? 
>From my current point of view they want a fresh armorkey for each conversation to decrease the vulnerability to replay attacks. But referring to page 31 of the RFC 6113 a nonce is included in the client request. So the chance to mount a replay attack should be decreased already. Are there any other advantages that come up with the generation of the armor key?


Regards,
Simon



More information about the Kerberos mailing list