Proxy for Kerberos?

Jeffrey Altman jaltman at secure-endpoints.com
Sun Jul 30 21:27:13 EDT 2006


John Hascall wrote:
>> Replication is not the desired semantic for this information.  You don't
>> want to overwrite the previous values such as "last attempt" and "number
>> of attempts".  Instead, periodically you want each server to broadcast
>> its list of applicable attempts for those principals that were accessed
>> since the most recent broadcast.  The receivers of the updates need to
>> merge the data to construct its current view of the world for that
>> principal.
>>
>> Right now there is nothing like this for MIT's code base.
> 
>> Note that even if there is an accurate means of synchronizing this
>> information that there is not a one to one relationship between a user
>> entering her principal and password and a request being sent to a KDC.
>> Today's clients frequently make multiple requests to one or more KDCs
>> so even when you have a multi-master configuration such as Active
>> Directory setting a policy of "three login attempts before lockout"
>> will not provide the behavior that administrators anticipate.
> 
>    It seems to me that to do this accurately there would need
>    to be some way to indentify that request 'A' at KDC-1 is
>    really the same user interaction as request 'B' at KDC-2.
>    Is there some unique-id in the requests that would even allow this?
>    (I can't think of one).
> 
> John

But its not just a question of whether two requests to different KDCs
are part of the same login attempt.  There are other issues such as
when the client doesn't know which salt to use.

Jeffrey Altman

-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/x-pkcs7-signature
Size: 3355 bytes
Desc: S/MIME Cryptographic Signature
Url : http://mailman.mit.edu/pipermail/krbdev/attachments/20060730/b8f5fc39/attachment.bin


More information about the krbdev mailing list