Rocksolid Light

Welcome to RetroBBS

mail  files  register  newsreader  groups  login

Message-ID:  

"When in doubt, print 'em out." -- Karl's Programming Proverb 0x7


devel / comp.protocols.kerberos / Re: help with OTP

SubjectAuthor
o Re: help with OTPRuss Allbery

1
Re: help with OTP

<mailman.78.1682973810.1964.kerberos@mit.edu>

  copy mid

https://www.rocksolidbbs.com/devel/article-flat.php?id=361&group=comp.protocols.kerberos#361

  copy link   Newsgroups: comp.protocols.kerberos
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!tncsrv06.tnetconsulting.net!.POSTED.mailman.mit.edu!not-for-mail
From: eagle@eyrie.org (Russ Allbery)
Newsgroups: comp.protocols.kerberos
Subject: Re: help with OTP
Date: Mon, 01 May 2023 13:43:07 -0700
Organization: The Eyrie
Lines: 16
Message-ID: <mailman.78.1682973810.1964.kerberos@mit.edu>
References: <CAOLfK3WVppnk3eouiLTxhiR5gXQcCVd7K5xr_erP=y_RkeVpPw@mail.gmail.com>
<202304242225.33OMPJdw026540@hedwig.cmf.nrl.navy.mil>
<CAOLfK3XZF95-XoaW8y8cMrMETpWQNV-=EEkMyreo18WXH5M3sg@mail.gmail.com>
<CAJhaRZ+wc0N_YX06jdsh8iHTSn1dJoH3bn6q6Mm0V35h-8FARg@mail.gmail.com>
<CAOLfK3Xs9X25-jY+GjXqmNEOYbSNSVMXdBojX=k28FWqenWG+A@mail.gmail.com>
<CAJhaRZJP+Cz0RkSyOaWmjH5UHjye43k7B9G=dRechpN3Ad4qXg@mail.gmail.com>
<CAOLfK3VOZSNFhpkSKy5XsaA2mFUDVCGdjjZdna_O8M2RaAZPyw@mail.gmail.com>
<202304260001.33Q01xYH024064@hedwig.cmf.nrl.navy.mil>
<7586f99f-1c5e-f8c9-e128-eb457508556b@mit.edu>
<202304261528.33QFSGrc012160@hedwig.cmf.nrl.navy.mil>
<871qk61nfo.fsf@hope.eyrie.org>
<PH0PR14MB549307B0C36B735AE3375F33AA6E9@PH0PR14MB5493.namprd14.prod.outlook.com>
<87fs8fiy04.fsf@hope.eyrie.org>
Mime-Version: 1.0
Content-Type: text/plain
Injection-Info: tncsrv06.tnetconsulting.net; posting-host="mailman.mit.edu:18.7.21.50";
logging-data="1176"; mail-complaints-to="newsmaster@tnetconsulting.net"
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/28.2 (gnu/linux)
Cc: Ken Hornstein via Kerberos <kerberos@mit.edu>, Ken Hornstein
<kenh@cmf.nrl.navy.mil>
To: Charles Hedrick <hedrick@rutgers.edu>
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
b=GDOolXxkqhDe0V/di4948ro3JZiad8PzjkYaHToJXHNJlR3wnsjPvTRYoNsIE2YXFKOuGjfiyB8I3DE+q7Fys2UHmGB8CTG0TpLBdyk1C3zJqK7xNkv5oUfd8biHQYS63rtldq5xnR55W4mi6tLmIW9on4uWDvGIn9eWusR+/UabGpE9OR2B8cdByYkY1/wvM/y15RKFyXgUxN4SxASvaVTaMocl59Yl1NfGKRHq+e5yKvj+8LXlHwb6Pr0q2yRWd9Nm3buY2u6cTmg94VCPzbkXVZ7kw58Vieo05ccyKn1fqih776n//sXFJlsaHNgEUy7JT6LhmwQwh0JiGWygCA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
s=arcselector9901;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
bh=z2IYhfs90nvpH9o2zoyOMF6oH1BMwBJJDBnYSCeMBrw=;
b=VlKrvT32CTa9JNP2A1vYn3UfmJQHcIpthqlbIYNR5KpIHYCSOLn7fcRugMQruOEimpWEgYhKhGS7wm/PCy6LhHwgO3nwPK5rs8xsoT56I2CT5jz0LZ0L8Y/UfxwTCKTfjLLa9WR8ivUprYemvVfb1fxkgZ/N/c/ow3VhJAxzY/su1JvO8iz7B5gxSMWxOeqCAFX0w6bxT68ulGnGV+dyBp9eAIpqxY7acYVrP/LKkcR9c0OdWTL4dZiG8YCsUb4svUu3Vdjjgov0qQHYw91I9e1rOY0ODHC1a1ciizvSet3lUWWo02RgSy+cAGt14fwgpRVYmV0gxMQnyH4uvdEVcw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
166.84.7.159) smtp.rcpttodomain=mit.edu smtp.mailfrom=eyrie.org;
dmarc=bestguesspass action=none header.from=eyrie.org; dkim=none (message not
signed); arc=none (0)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=mitprod.onmicrosoft.com; s=selector2-mitprod-onmicrosoft-com;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
bh=z2IYhfs90nvpH9o2zoyOMF6oH1BMwBJJDBnYSCeMBrw=;
b=hsLHS4Yj1mfqy5iu+AKuvuhyc/Zx4EoR6JawzqLnnnRY2nixMni2sNEVnp9TBfF/AdSB+5Z4A3pmZuMgCxPOl/V0matkR/4FoM3LIBLGv1tXlHUUpj6xLBSD1a8EpXLMVEvOMa2p09mXGY6Kp//Mo4pF3OrHrPJq881w/PZUhJU=
Authentication-Results: spf=pass (sender IP is 166.84.7.159)
smtp.mailfrom=eyrie.org; dkim=none (message not signed)
header.d=none;dmarc=bestguesspass action=none header.from=eyrie.org;
Received-SPF: Pass (protection.outlook.com: domain of eyrie.org designates
166.84.7.159 as permitted sender) receiver=protection.outlook.com;
client-ip=166.84.7.159; helo=haven.eyrie.org; pr=C
In-Reply-To: <PH0PR14MB549307B0C36B735AE3375F33AA6E9@PH0PR14MB5493.namprd14.prod.outlook.com>
(Charles Hedrick's message of "Mon, 1 May 2023 20:29:31 +0000")
X-EOPAttributedMessage: 0
X-EOPTenantAttributedMessage: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b:0
X-MS-PublicTrafficType: Email
X-MS-TrafficTypeDiagnostic: DM6NAM11FT045:EE_|BL0PR01MB5041:EE_
X-MS-Office365-Filtering-Correlation-Id: 59aaa725-a708-4a96-7c37-08db4a84accb
X-LD-Processed: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b,ExtAddr
X-MS-Exchange-AtpMessageProperties: SA
X-MS-Exchange-SenderADCheck: 0
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:166.84.7.159; CTRY:US; LANG:en; SCL:1; SRV:;
IPV:NLI; SFV:NSPM; H:haven.eyrie.org; PTR:haven.eyrie.org; CAT:NONE;
SFS:(13230028)(4636009)(39860400002)(376002)(136003)(396003)(346002)(451199021)(426003)(336012)(83380400001)(107886003)(3480700007)(356005)(54906003)(36916002)(6266002)(498600001)(42186006)(26005)(4744005)(2906002)(7116003)(5660300002)(7596003)(68406010)(4326008)(70586007)(7636003)(8676002)(786003)(6862004)(86362001)(316002);
DIR:OUT; SFP:1102;
X-Auto-Response-Suppress: DR, OOF, AutoReply
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 May 2023 20:43:09.6806 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 59aaa725-a708-4a96-7c37-08db4a84accb
X-MS-Exchange-CrossTenant-Id: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b
X-MS-Exchange-CrossTenant-AuthSource: DM6NAM11FT045.eop-nam11.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: Internet
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL0PR01MB5041
X-OriginatorOrg: mitprod.onmicrosoft.com
X-BeenThere: kerberos@mit.edu
X-Mailman-Version: 2.1.34
Precedence: list
List-Id: The Kerberos Authentication System Mailing List <kerberos.mit.edu>
List-Unsubscribe: <https://mailman.mit.edu/mailman/options/kerberos>,
<mailto:kerberos-request@mit.edu?subject=unsubscribe>
List-Archive: <http://mailman.mit.edu/pipermail/kerberos/>
List-Post: <mailto:kerberos@mit.edu>
List-Help: <mailto:kerberos-request@mit.edu?subject=help>
List-Subscribe: <https://mailman.mit.edu/mailman/listinfo/kerberos>,
<mailto:kerberos-request@mit.edu?subject=subscribe>
X-Mailman-Original-Message-ID: <87fs8fiy04.fsf@hope.eyrie.org>
X-Mailman-Original-References: <CAOLfK3WVppnk3eouiLTxhiR5gXQcCVd7K5xr_erP=y_RkeVpPw@mail.gmail.com>
<202304242225.33OMPJdw026540@hedwig.cmf.nrl.navy.mil>
<CAOLfK3XZF95-XoaW8y8cMrMETpWQNV-=EEkMyreo18WXH5M3sg@mail.gmail.com>
<CAJhaRZ+wc0N_YX06jdsh8iHTSn1dJoH3bn6q6Mm0V35h-8FARg@mail.gmail.com>
<CAOLfK3Xs9X25-jY+GjXqmNEOYbSNSVMXdBojX=k28FWqenWG+A@mail.gmail.com>
<CAJhaRZJP+Cz0RkSyOaWmjH5UHjye43k7B9G=dRechpN3Ad4qXg@mail.gmail.com>
<CAOLfK3VOZSNFhpkSKy5XsaA2mFUDVCGdjjZdna_O8M2RaAZPyw@mail.gmail.com>
<202304260001.33Q01xYH024064@hedwig.cmf.nrl.navy.mil>
<7586f99f-1c5e-f8c9-e128-eb457508556b@mit.edu>
<202304261528.33QFSGrc012160@hedwig.cmf.nrl.navy.mil>
<871qk61nfo.fsf@hope.eyrie.org>
<PH0PR14MB549307B0C36B735AE3375F33AA6E9@PH0PR14MB5493.namprd14.prod.outlook.com>
 by: Russ Allbery - Mon, 1 May 2023 20:43 UTC

Charles Hedrick <hedrick@rutgers.edu> writes:

> Anonymous PKINIT works fine but requires certs to be distributed. Unless
> you're prepared to update every machine in the world every year, you
> pretty much have to use a cert that goes back to a commercial CA.

Because you have to distribute the certs to the client anyway, you can use
self-signed certificates and set whatever expiration you want. There's
the standard tradeoff of long certificate lifetime, but so far as I know
there's no reason why you can't set your KDC public key certificate
lifetime to 50 years or whatever.

I agree with your other points, though.

--
Russ Allbery (eagle@eyrie.org) <https://www.eyrie.org/~eagle/>

1
server_pubkey.txt

rocksolid light 0.9.8
clearnet tor