Replay cache protection
josephharfouch@iinet.net.au
josephharfouch at iinet.net.au
Fri Feb 8 12:27:40 EST 2008
Hi,
I have been lately looking at the code concerned with preventing
replay att some undocumented s because of the way some a particular setup. This is be shared, but replay caches, accor MIT Kerberos code, may not be system wide, shared between servers. I'm not really very familia Kerberos code, so I wanted to get a second opinion whether t concerns are correct, or if I simply misunderstood the code. If some
o deal wit Scenario 1
========
Two applicaton servers A and B both have their their keys stored in
t written accept any valid versa. It seems s are written using gss where name in the ticket matches the n krb5 calls, such as krb5_rd_req with a se understanding is that any ticket that can be decrypte the matching entry in the keytab is acceptable, so theoreti Server A can decode server B' tickets and vice versa.
Now, if server A has just finished processing a server ticket that has
been authenticato skew time, I would&n attack because it just finished already stored it in its replay cache, bu that is a replay attack, i.e would B know that processed this ticket?
Scenario 2
=======
This is a variation of scenario 1, where the administrator has used
the sam machines. i.e A and theoretically decrypt each others ticke Scenario 3
=======
Here, multiple application servers that share the same name!!! are
ru presumably becaus I had a look in RFCs 1510 and 4120 but I didn't find any comments
reg would be i you think an expa would be justified, or wheth documentation, setups and coding practic applications more vulnerable to replay attacks.
Many Thanks
Jospeh Harfouch
More information about the krbdev
mailing list