After RFC 8429: Deprecate Triple-DES (3DES) and RC4 in Kerberos

Derek Atkins derek at ihtfp.com
Mon Nov 5 10:57:50 EST 2018


Greg Hudson <ghudson at mit.edu> writes:

> On 11/01/2018 10:30 AM, Weijun Wang wrote:
>> Now that RFC 8429 is published and 3DES and RC4 are deprecated, is
>> there any plan to remove them from etype list of KDC-REQ?
>
> For RC4, I would like Microsoft to take the lead.  3DES is our 
> responsibility, and is probably not in nearly as much use (although I'd 
> have to at least check if we're still using it internally at MIT), so it 
> is probably not as painful to deprecate.
>
> There is some ambiguity in how weak an enctype needs to be to qualify 
> for being affected by allow_weak_crypto.  The primary concerns about 
> des3-cbc-sha1 are its 64-bit block size and the fast speed of its 
> string-to-key operation; both of these are far less problematic than the 
> practical ability to recover a random single-DES key.  It would also be 
> a shame if administrators wound up enabling DES in order to make DES3 
> work (or RC4).

Maybe we need an "allow_very_weak_crypto" in addition to the
"allow_weak_crypto"?

> krbdev mailing list             krbdev at mit.edu
> https://mailman.mit.edu/mailman/listinfo/krbdev

-derek

-- 
       Derek Atkins                 617-623-3745
       derek at ihtfp.com             www.ihtfp.com
       Computer and Internet Security Consultant


More information about the krbdev mailing list