krb5_rd_cred checks IP address.

Booker C. Bense bbense at networking.stanford.edu
Fri Feb 8 11:16:01 EST 2002


On Thu, 7 Feb 2002, Sam Hartman wrote:

>
>
> amu recently filed a Debian bug against my ssh-krb5 package
> complaining that when he forwarded addressless tickets from behind a
> NAT using ssh protocol version 1 to a new server, it didn't work.  It
> turns out all of those qualifiers are necessary to reproduce the bug;
> change one and it works fine.  Well, OK, if you get addressful tickets
> behind a NAT, it fails much earlier
>
>
> Here's the problem.  Our implementation of krb5_rd_cread checks the
> source address to make sure it matches the source address in the
> KRB-CRED structure.  It turns out it only does this if the krb-cred
> structure is encrypted.  It turns out that you'll only encrypt the
> structure under the ssh v1 forwarding mechanism when a new client
> talks to a new server.
>
> I'm not really sure what good this check does other than to screw over
> NAT users.  Even if we pretend that we actually still care about IP
> address authentication what is the harm of accepting tickets from
> someone provided that they work?

- I can't see one. The whole rational for the IP check is to make
replay attacks harder, but I don't grok how that would even apply
in this situation.

>
> I'm really not sure how to go about fixing this problem.  I could see
> solving in several ways and am not sure which one the community
> prefers.  Do we remove the check on the source address?

- I would vote for this option. The IP checks have always seemed to
me to be the wrong solution to replay attacks, it doesn't really
solve the problem. A session key cache does.

- Booker C. Bense




More information about the krbdev mailing list