Kerberos packets appear to be larger
Jeremy Hunt
jeremyh at optimation.com.au
Thu Aug 8 17:48:14 EDT 2013
Thanks Greg that was a fantastic and detailed analysis.
Sorry about the pdml files, I sent them because I liked the format, I
will send a raw format if I have to again.
You have answered more questions, than I asked. So I only have one more.
From what you say, I presume any of these configuration fields in the
krb5.conf field
default_tkt_enctypes
default_tgs_enctypes
permitted_enctypes
kdc_req_checksum_type
ap_req_checksum_type
safe_checksum_type
would only have an affect once the key was regenerated. Is that correct?
If so it explains some of these fields having an effect in earlier
testing but not now. In earlier testing I tested with brand new
principals. Now I am testing with an existing 'testing' principal, with
an existing key, which needs a key change to have an effect. So if my
assumption in the last paragraph is correct we can reduce the size of
the data packets, but only if the principal's key with them in the
configuration file is regenerated. That is fantastic! Especially if
changing the password is sufficient. But I can test for that.
I agree with your comments about v4 and salts. I was investigating being
able to reduce the size of the packets. I noticed the extra salts and
thought that was proof that none of these fields affected the size of
the packets used in the kerberos protocol. Earlier, I was more
interested in changing the checksum type as a safer change, and that is
sufficient for my purposes.
Your comments on the AD-SIGNED-PATH field are of use too.
Thank you again,
Jeremy
Greg Hudson wrote:
> On 08/08/2013 01:41 AM, Jeremy Hunt wrote:
>> I can produce a snoop trace of both from my DEV environment, in fact I
>> have the 1.11 already. Do you want a PDML export, a txt export, the raw
>> snoop file or any other format?
>> Do you mind if I just send it to you rather than the list.
> [Jeremy sent me PDML files privately.] PDML files seem kind of
> inconvenient since I can't import them into wireshark. Raw pcap files
> which I can import into wireshark are preferable, but for now I was able
> to (with some effort) read the PDML by hand, so there's no need to
> re-send them. It looks like the expansion you're seeing breaks down
> into 109 additional bytes of padata and 72 bytes in the encrypted part
> of the ticket.
>
> The padata is larger because we always send explicit salts in 1.11.x.
> We don't have a way to turn off explicit salts, but there are some other
> ways to reduce the amount of padata sent. Using a v4 salt on the client
> long-term key is one of them; you appear to have tried this, but only in
> the configuration files. You will have to actually regenerate the
> client key for this to have an effect. Note that using the v4 salt type
> on multiple principals makes it easier to conduct an offline dictionary
> attack against many principals at once.
>
> The other way is to allow the client to request one of the AES enctypes
> in its AS request; this causes the KDC to only send a PA-ETYPE-INFO2
> field and no PA-ETYPE-INFO or PA-PW-SALT field (because any client new
> enough to understand AES is new enough to understand PA-ETYPE-INFO2).
> Even without using the v4 salt type, this should cut the padata field
> back down to around 50 bytes. It doesn't matter if the client would
> actually use an AES reply key or session key, only that an AES enctype
> appears in the request.
>
> The packet dumps don't show the encrypted part of the ticket (this would
> require configuring Wireshark with a keytab containing the service key,
> which in this case is the TGT key). But 72 bytes happens to be the size
> of the AD-SIGNEDPATH authdata element we added in 1.8. We also don't
> have a way to turn this off, although we're planning to add one in 1.12.
> However, this element should already be reflected in your 1.8
> deployment. Is it possible that you modified the 1.8 code to remove
> AD-SIGNEDPATH? If so, you'll need to modify the 1.11.x code as well.
>
> ________________________________________________
> Kerberos mailing listKerberos at mit.edu
> https://mailman.mit.edu/mailman/listinfo/kerberos
More information about the Kerberos
mailing list