Rocksolid Light

Welcome to RetroBBS

mail  files  register  newsreader  groups  login

Message-ID:  

Disk crisis, please clean up!


devel / comp.protocols.kerberos / Re: RFC 4121 & acceptor subkey use in MIC token generation

SubjectAuthor
o Re: RFC 4121 & acceptor subkey use in MIC token generationJeffrey Hutzelman

1
Re: RFC 4121 & acceptor subkey use in MIC token generation

<mailman.32.1698359201.2263420.kerberos@mit.edu>

  copy mid

https://www.rocksolidbbs.com/devel/article-flat.php?id=408&group=comp.protocols.kerberos#408

  copy link   Newsgroups: comp.protocols.kerberos
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!tncsrv06.tnetconsulting.net!.POSTED.mailman.mit.edu!not-for-mail
From: jhutz@cmu.edu (Jeffrey Hutzelman)
Newsgroups: comp.protocols.kerberos
Subject: Re: RFC 4121 & acceptor subkey use in MIC token generation
Date: Thu, 26 Oct 2023 18:26:18 -0400
Organization: TNet Consulting
Lines: 72
Message-ID: <mailman.32.1698359201.2263420.kerberos@mit.edu>
References: <202310251251.39PCpTqc026799@hedwig.cmf.nrl.navy.mil>
<ZTk62q0DIAZmW0eL@ubby21>
<CALF+FNwtDrQ0d+a=zsXyiYq6rhOiXXkqoxUnscwum0Q0wchLJQ@mail.gmail.com>
<202310261741.39QHfgIl030099@hedwig.cmf.nrl.navy.mil>
<ZTqtQYPlzdpQGyr+@ubby21>
<202310261827.39QIRu4Q000307@hedwig.cmf.nrl.navy.mil>
<ZTqw9+Etcwo8SqR4@ubby21>
<202310261838.39QIcl16000930@hedwig.cmf.nrl.navy.mil>
<ZTrAlh0a/+Vq5P4f@ubby21>
<202310262110.39QLAdhW010116@hedwig.cmf.nrl.navy.mil>
<ZTraV0714XV7hsxx@ubby21>
<202310262157.39QLvb2C012728@hedwig.cmf.nrl.navy.mil>
<CALF+FNzM=egHeLLcqnVJpNv5kzQ7dq1sONP3Ba18Q2av-5f54w@mail.gmail.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Injection-Info: tncsrv06.tnetconsulting.net; posting-host="mailman.mit.edu:18.7.21.50";
logging-data="907"; mail-complaints-to="newsmaster@tnetconsulting.net"
Cc: kerberos@mit.edu
To: Ken Hornstein <kenh@cmf.nrl.navy.mil>
DKIM-Filter: OpenDKIM Filter v2.11.0 unknown-host (unknown-jobid)
Authentication-Results: mailman.mit.edu;
dkim=pass (1024-bit key, unprotected) header.d=mitprod.onmicrosoft.com
header.i=@mitprod.onmicrosoft.com header.a=rsa-sha256
header.s=selector2-mitprod-onmicrosoft-com header.b=Mh69Y0wT;
dkim=pass (2048-bit key,
unprotected) header.d=cmu.edu header.i=@cmu.edu header.a=rsa-sha256
header.s=google-2021 header.b=AHfjX9dU
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
b=WM+qy7FjAlCTeF5RKBMJLvjyGwZSaZodevEHMUsd9rcJ+xnkTBri/jRy4mYGyCv2cSazMuHkl8Jgu2nKDwyy6BRl5lETWmkeTMPzTRzDeOcHAPoRA3pb1KlUI2+y6wfC8PLH/AcpsunYGbjTJP/kqyfVWCi9XcsGrMMuvY2ko1wS1/Und+TYFRpQBHzCzwCtjZ9d92vNkUtGZa5D8oBbzL63ogSPjAUsaNjbdCNyZfe2tK7Pulya/khTbSv9wIlrGERGhr9kAQSSXwVqOgk6XZlP5vb/LBIrZFRaQv86/3frR9Gjr/hXBlrvRqaMn8zmvtGvOTutCTCDU/eR2OmsoA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
s=arcselector9901;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
bh=P5YhSOv3jDUJRkCgLVm1ODGxE5HRmKo7t5d1MRwsl2k=;
b=bflpPoutciXPbpCZAFkTapiF7HP82noxnR/U/6kFZouzGMrFZmqq/2fmqCPfGvgNqjJb/6SnziqkktlXJNTV7zecj7qjZAAjk7oXas7p8QQyDGIMP8BjLEWzPaELDBtYV4ddc2bwlhB2B7Dkoym41gQOhLFk0SXpoxK2NgT8hUvXrvFed/+28K/gJ3XYsVMjqNmf5+wfL95gf4Amko2rzEDtnluoGbiuYEpCNBe4Wdu4Sz4DzzXxPSbzVOHnAQ0w3hN+Ec7Nn8Hb5M2S85DW2gADBvg8nqFruifFT5OqmGiiJj3MoLF+1btX9JEJiT5snLZAXV0hn6WMeYHakcuEOg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
209.85.222.48) smtp.rcpttodomain=mit.edu smtp.mailfrom=andrew.cmu.edu;
dmarc=pass (p=none sp=none pct=100) action=none header.from=cmu.edu;
dkim=pass (signature was verified) header.d=cmu.edu; arc=none (0)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=mitprod.onmicrosoft.com; s=selector2-mitprod-onmicrosoft-com;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
bh=P5YhSOv3jDUJRkCgLVm1ODGxE5HRmKo7t5d1MRwsl2k=;
b=Mh69Y0wTZLocOHhz8Y60YTaSyfOu6oEiJxeU1jpMDQWp3yP9OiOHkByTToQ6eqB/5Uvf5adXDLxxy7y7Ys/6gS523juQQoQiU3AhjekuhCf0oYwEeTxmo2bLfZvm/7l0dm/5wMiFUqjHfvnoYMWxi8xQjquvFF2BiBoeVuicci8=
Authentication-Results: spf=pass (sender IP is 209.85.222.48)
smtp.mailfrom=andrew.cmu.edu; dkim=pass (signature was verified)
header.d=cmu.edu;dmarc=pass action=none header.from=cmu.edu;
Received-SPF: Pass (protection.outlook.com: domain of andrew.cmu.edu
designates 209.85.222.48 as permitted sender)
receiver=protection.outlook.com; client-ip=209.85.222.48;
helo=mail-ua1-f48.google.com; pr=C
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=cmu.edu; s=google-2021; t=1698359190; x=1698963990; darn=mit.edu;
h=cc:to:subject:message-id:date:from:in-reply-to:references
:mime-version:from:to:cc:subject:date:message-id:reply-to;
bh=P5YhSOv3jDUJRkCgLVm1ODGxE5HRmKo7t5d1MRwsl2k=;
b=AHfjX9dUkxhGLC6vEo+H3wuqsfRpMZIh5bcT2NpY10yUd1k09HixvTL4SSyo6I59Pw
T/LDjOkIdsmd44Xf1jzslO4vyItqTC/H3Zk1qjKHllivUCM0WulWlWMp2w6cmUTwQznI
ApcEozItC892K79bLfrWEi7Jdk5DCRMR+pvcimwSM88PoZ7Z+N48+6RgtUuJRVxaQ/xH
k5DgKRIWLdzMx3vcOVHKut44jKJfjwE0iWN0IlrKZVFnIENlyKOw6jW7U/2+ukdGRhw4
cUZ0HXo6s5Q2d/+Gacbtx0iUEtXbSVCCwWwIBKPGePt5SH9zP9qOkQiqKDO286TbKesM
lQuA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=1e100.net; s=20230601; t=1698359190; x=1698963990;
h=cc:to:subject:message-id:date:from:in-reply-to:references
:mime-version:x-gm-message-state:from:to:cc:subject:date:message-id
:reply-to;
bh=P5YhSOv3jDUJRkCgLVm1ODGxE5HRmKo7t5d1MRwsl2k=;
b=UPwh3IrLDXloyAvqhYdHHXhW2GSpUsJF97LJsjy8DTnQ+5+U1hIMBKXWi4eRJffmk7
/Mi5Bu0+wGwhGxLxIJrkOQRxWgY9b/2QFYZLtNqWOTgbFzypdpzosSbhsqXHbdoF0yjj
gpiGh2Hl0RClYODKDqSGict152sKVBz5WsQBM90zNwSWgnuI6vNaceMiUDPo5q2Jajrl
reEABE4Qlvbk2Pd4Txjjji4EmGZ6551uBSz4AWWQsdC3xT7bCG51Qad7RpRumhRe3hPn
KVFIy59lcaXJivofQhg/098qIfE4z+DQ7ZFXZeub0PoxTO7cHHVfjHbZW6zfBEl1fDbU
4SfA==
X-Gm-Message-State: AOJu0Yxv4kHlN8QieWHlYrXr6+yIh6Nh8ox814KY5xs1raBPaZ2SG8pB
Nhgb2qUN7EyOIYEnxqHVNSwpjgTPSz/g2ebj96fcYFRbiz7SW1ydgQqp1Q==
X-Google-Smtp-Source: AGHT+IEkJ5FyS3NYCFwGYK7wHG0Hn0OLyDOAfKBfF5jJRcSUiCI20se/MuJEKPOG1JpK2B3ZY3PdUA1n89emTN8qNdE=
X-Received: by 2002:a67:ef02:0:b0:455:c426:1b22 with SMTP id
j2-20020a67ef02000000b00455c4261b22mr1035102vsr.16.1698359189933; Thu, 26 Oct
2023 15:26:29 -0700 (PDT)
In-Reply-To: <202310262157.39QLvb2C012728@hedwig.cmf.nrl.navy.mil>
X-EOPAttributedMessage: 0
X-EOPTenantAttributedMessage: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b:0
X-MS-PublicTrafficType: Email
X-MS-TrafficTypeDiagnostic: MN1PEPF0000F0E3:EE_|SJ2PR01MB7982:EE_
X-MS-Office365-Filtering-Correlation-Id: 62d9f60e-1790-46aa-7721-08dbd6729a3b
X-LD-Processed: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b,ExtAddr
X-MS-Exchange-AtpMessageProperties: SA
X-MS-Exchange-SenderADCheck: 0
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:209.85.222.48; CTRY:US; LANG:en; SCL:1; SRV:;
IPV:NLI; SFV:NSPM; H:mail-ua1-f48.google.com; PTR:mail-ua1-f48.google.com;
CAT:NONE;
SFS:(13230031)(4636009)(346002)(376002)(136003)(396003)(39860400002)(64100799003)(61400799006)(48200799006)(451199024)(33964004)(66899024)(75432002)(4326008)(336012)(356005)(55446002)(2906002)(7596003)(966005)(70586007)(68406010)(6862004)(9686003)(7636003)(786003)(8676002)(42186006)(498600001)(316002)(5660300002)(26005)(53546011)(166002)(83380400001)(6666004)(83170400001);
DIR:OUT; SFP:1102;
X-Auto-Response-Suppress: DR, OOF, AutoReply
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Oct 2023 22:26:30.5105 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 62d9f60e-1790-46aa-7721-08dbd6729a3b
X-MS-Exchange-CrossTenant-Id: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b
X-MS-Exchange-CrossTenant-AuthSource: MN1PEPF0000F0E3.namprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: Internet
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ2PR01MB7982
X-OriginatorOrg: mitprod.onmicrosoft.com
X-Content-Filtered-By: Mailman/MimeDel 2.1.34
X-BeenThere: kerberos@mit.edu
X-Mailman-Version: 2.1.34
Precedence: list
List-Id: The Kerberos Authentication System Mailing List <kerberos.mit.edu>
List-Unsubscribe: <https://mailman.mit.edu/mailman/options/kerberos>,
<mailto:kerberos-request@mit.edu?subject=unsubscribe>
List-Archive: <http://mailman.mit.edu/pipermail/kerberos/>
List-Post: <mailto:kerberos@mit.edu>
List-Help: <mailto:kerberos-request@mit.edu?subject=help>
List-Subscribe: <https://mailman.mit.edu/mailman/listinfo/kerberos>,
<mailto:kerberos-request@mit.edu?subject=subscribe>
X-Mailman-Original-Message-ID: <CALF+FNzM=egHeLLcqnVJpNv5kzQ7dq1sONP3Ba18Q2av-5f54w@mail.gmail.com>
X-Mailman-Original-References: <202310251251.39PCpTqc026799@hedwig.cmf.nrl.navy.mil>
<ZTk62q0DIAZmW0eL@ubby21>
<CALF+FNwtDrQ0d+a=zsXyiYq6rhOiXXkqoxUnscwum0Q0wchLJQ@mail.gmail.com>
<202310261741.39QHfgIl030099@hedwig.cmf.nrl.navy.mil>
<ZTqtQYPlzdpQGyr+@ubby21>
<202310261827.39QIRu4Q000307@hedwig.cmf.nrl.navy.mil>
<ZTqw9+Etcwo8SqR4@ubby21>
<202310261838.39QIcl16000930@hedwig.cmf.nrl.navy.mil>
<ZTrAlh0a/+Vq5P4f@ubby21>
<202310262110.39QLAdhW010116@hedwig.cmf.nrl.navy.mil>
<ZTraV0714XV7hsxx@ubby21>
<202310262157.39QLvb2C012728@hedwig.cmf.nrl.navy.mil>
 by: Jeffrey Hutzelman - Thu, 26 Oct 2023 22:26 UTC

The gss-keyex userauth method is just an optimization; it prevents you
having to actually run the GSSAPI exchange again after you've already used
one of the GSSAPI-based keyex methods. The real win is in the GSSAPI-based
keyex methods themselves, which are useful (and exist) because they avoid
having to pick one of these:

1. Jump in blindly and hope there's no MITM on the first connection
2. Distribute copies of all the host public keys to all possible clients
3. Operate a PKI for identifying hosts

Of course, lots of people do (1); ssh has encouraged that since its
earliest days. And around the time I was first working on what became
RFC4462, I was also building 2-3 generations of tooling for (2).

On Thu, Oct 26, 2023 at 5:59 PM Ken Hornstein via Kerberos <kerberos@mit.edu>
wrote:

> >> Unfortunately, ANOTHER one of the "fun" rules I live under is, "Thou
> >> shall have no other PKI than the DoD PKI". And as much as I can
> >> legitimately argue for many of the unusual things that I do, I can't get
> >> away with that one; [...]
> >
> >A CA that issues short-lived certificates (for keys that might be
> >software keys) is morally equivalent to a Kerberos KDC. You ought to be
> >able to deploy such online CAs that issue only short-lived certs.
>
> You know that. I know that. But remember: "if you're explaining,
> you're losing". When asked I can honestly say, "Kerberos is not
> a PKI" and that's good enough, but I can't say with a straight
> face, "This X.509 CA over here is not a PKI".
>
> >Presumably OpenSSH CAs are a different story because they're not x.509?
> :)
>
> Strangely enough, I am not aware of anyone in the DoD that uses OpenSSH
> CAs (there probably are, I just don't know them). I could see it being
> argued both ways. The people I know who use OpenSSH are (a) using
> gssapi-with-mic like us, (b) just using passwords, or (c) using their
> client smartcart key as a key for RSA authentication and they call that
> "DOD PKI authentication". Again, you know and I know that isn't really
> using PKI certificates, but the people up the chain aren't really smart
> enough to understand the distinction; they see that you're using the
> smartcard and that's good enough for them.
>
> >> We _do_ do PKINIT with the DoD PKI today; that is relatively
> >> straightforward with the exception of dealing with certificate
> >> revocation (last time I checked the total size of the DOD CRL package
> >> was approximately 8 million serial numbers, sigh).
> >
> >Don't you have OCSP responders?
>
> We _do_, it's just a pain to find an OCSP responder that can handle that
> many. If the official ones go offline that breaks our KDC so we run our
> own locally.
>
> >One of the problems I'm finding is that SSHv2 client implementations are
> >proliferating, and IDEs nowadays tend to come with one, and not one of
> >them supports GSS-KEYEX, though most of them support gssapi-with-mic, so
> >it makes you want to give up on GSS-KEYEX.
>
> Right, part of the problem there is that people want to "use Kerberos
> with ssh", and they don't understand the difference between gssapi-with-mic
> and gss-keyex.
>
> --Ken
> ________________________________________________
> Kerberos mailing list Kerberos@mit.edu
> https://mailman.mit.edu/mailman/listinfo/kerberos
>

1
server_pubkey.txt

rocksolid light 0.9.81
clearnet tor