[krbdev.mit.edu #1620] should have option to randomize salt at pw change
Ken Raeburn via RT
rt-comment at krbdev.mit.edu
Fri Jun 20 16:16:55 EDT 2003
As I'm writing up in the AES draft, always using a known salt string
for a given principal allows an attacker to build up a dictionary of
keys from a password dictionary, and save intermediate results to
re-use even if the iteration count is varied when the password is
changed.
We should have an option to randomize the salt string when the
password is changed. For AES, at least; I don't think it would do any
harm for other encryption types.
Ken
More information about the krb5-bugs
mailing list