random to key from password

Nicolas Williams Nicolas.Williams at oracle.com
Mon Sep 27 16:56:59 EDT 2010


On Mon, Sep 27, 2010 at 04:42:14PM -0400, Sam Hartman wrote:
> The KDC prefers AES to DES.
> So, you'll never be able to use the DES key for much, but it exists and
> you can somehow get some text to attack it.

How would you get that ciphertext?  I think the best you could do is
construct garbage ticket en-parts and fling them at a service oracle,
see what you get back in the KRB-ERROR (and if there's useful leaks
there then we have a problem).  (Now would be a good time to make sure
that there's no CBC (or CTS, for less than 1 block of text) padding
leaks here...)

> However if you want to decrypt tickets, you're going to need the AES
> key.

Who wants to decrypt tickets?  I suspect the attacker will want to
_mint_ tickets.  Yes, yes, it's all the same given a symmetric cipher :)

Nico
-- 



More information about the krbdev mailing list