MITKRB5-SA-2003-004: Cryptographic weaknesses in Kerberos v4 protocol
Sam Hartman
hartmans at MIT.EDU
Mon Mar 17 18:27:48 EST 2003
>>>>> "Darren" == Darren Reed (OSE) <darrenr at optimation.com.au> writes:
Darren> One thing I'm not clear on having read that is how deep
Darren> the problem is. If you're not using krb524d, does that
Darren> mean you are not vulnerable if you are using 1.2.7, even
Darren> if you have enabled v4 keys as a "supported_enctype" in
Darren> kdc.conf ?
Enabling v4 keys in kdc.conf does not matter. The question is whether
KDC support for v4 is on. If you run with -4 none or -4 disabled on
the command line and do not run krb524d you are not vulnerable.
More information about the krbdev
mailing list