Rocksolid Light

Welcome to RetroBBS

mail  files  register  newsreader  groups  login

Message-ID:  

<Stealth> How do I bind a computer to an NIS server? <Joey> Use a rope? -- Seen on #Debian


devel / comp.protocols.kerberos / Re: Using PKINIT with ECC

SubjectAuthor
o Re: Using PKINIT with ECCKen Hornstein

1
Re: Using PKINIT with ECC

<mailman.53.1700142136.2263420.kerberos@mit.edu>

  copy mid

https://www.rocksolidbbs.com/devel/article-flat.php?id=431&group=comp.protocols.kerberos#431

  copy link   Newsgroups: comp.protocols.kerberos
Path: i2pn2.org!i2pn.org!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!tncsrv06.tnetconsulting.net!.POSTED.mailman.mit.edu!not-for-mail
From: kenh@cmf.nrl.navy.mil (Ken Hornstein)
Newsgroups: comp.protocols.kerberos
Subject: Re: Using PKINIT with ECC
Date: Thu, 16 Nov 2023 08:41:18 -0500
Organization: TNet Consulting
Lines: 15
Message-ID: <mailman.53.1700142136.2263420.kerberos@mit.edu>
References: <8984fe41-f9a0-434b-a09c-df2bc88125dc@sec4mail.de>
<202311161341.3AGDfILU018263@hedwig.cmf.nrl.navy.mil>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Injection-Info: tncsrv06.tnetconsulting.net; posting-host="mailman.mit.edu:18.7.21.50";
logging-data="28632"; mail-complaints-to="newsmaster@tnetconsulting.net"
Cc: kerberos@mit.edu
To: Goetz Golla <mit@sec4mail.de>
DKIM-Filter: OpenDKIM Filter v2.11.0 unknown-host (unknown-jobid)
Authentication-Results: mailman.mit.edu;
dkim=pass (1024-bit key, unprotected) header.d=mitprod.onmicrosoft.com
header.i=@mitprod.onmicrosoft.com header.a=rsa-sha256
header.s=selector2-mitprod-onmicrosoft-com header.b=jw1kl6Sw;
dkim=pass (2048-bit key,
unprotected) header.d=nrl.navy.mil header.i=@nrl.navy.mil header.a=rsa-sha256
header.s=s2.dkim header.b=HcDy5BGp
Authentication-Results: mit.edu; dmarc=pass (p=reject dis=none)
header.from=cmf.nrl.navy.mil
Authentication-Results: mit.edu; arc=pass smtp.remote-ip=18.7.73.16
ARC-Seal: i=2; a=rsa-sha256; d=mit.edu; s=arc; t=1700142132; cv=pass;
b=Oolce0XEIBLyNaiNueTp2OSMe5qskmg1i+3kKd368IPEZ1sqeiHXdZyJEthmrRFRcM6Zoy8rlyhv9zWLV6x9j1CHXlTig8c6YuqOno5MIWQsYb7c2DyDBa5K35Iwm5gUIWy/4QD3sfngrgky73YqIXJXzyZSssY/cG8xMbeVaGIZ4FalrgIfkj7BaIAd3sF0D1kjPa13g5Z80ahGBGYVD3j96ivQ4VmDVMz4Y8uXHR9zJanWPVsSsLMthdzPBC1khu5EGMTyAymnZOKYtexvjsD7UQL9QQ1B5mbmsxwYNqRbihDHp1CGagcIQkJtLAKmVJlsVLdu16OAvc2TQCj9/Q==
ARC-Message-Signature: i=2; a=rsa-sha256; d=mit.edu; s=arc; t=1700142132;
c=relaxed/relaxed; bh=ffEvXR4f6aRCbil1z8eMTbewga43ySHwufD1RDya9iI=;
h=Message-ID:From:Subject:MIME-Version:Content-Type:Date;
b=i9Vceugo1pRPpR4h11oKyhTsR9j8AbdXiKnK7t78cJ6iPo9u0KUGXSUzHBs4uF8oy86nkkguap1K6fnWzbryJ1BJ402u+7SZnEdhSkbAGd/GbWpEbblQbvxXpmNdxAhd4siZlVsjbcoGJJTiSS1zVkHjJs7Uptj+w+Arp0I+cAoMRTWOQ/BWHka2QzhGXzaVX3Nj2g6b9FdHYONt4cAuhJRfhkHXSrZwuG2fC3MYjBsWRI0mOHxqriuPDx5S5g3GjuYgZXseUEgzAqh/c4G3/8BNEM7hFpD0QH3W/XbUheRt0RPKICAln1gYn1dK90cyR02Rc/Krc9IF+RpOMgtD4Q==
ARC-Authentication-Results: i=2; mit.edu; dkim=pass (1024-bit key;
unprotected) header.d=mitprod.onmicrosoft.com
header.i=@mitprod.onmicrosoft.com header.a=rsa-sha256
header.s=selector2-mitprod-onmicrosoft-com header.b=jw1kl6Sw;
dkim=pass (2048-bit key;
unprotected) header.d=nrl.navy.mil header.i=@nrl.navy.mil header.a=rsa-sha256
header.s=s2.dkim header.b=HcDy5BGp
Authentication-Results: mit.edu; dkim=pass (1024-bit key;
unprotected) header.d=mitprod.onmicrosoft.com
header.i=@mitprod.onmicrosoft.com header.a=rsa-sha256
header.s=selector2-mitprod-onmicrosoft-com header.b=jw1kl6Sw;
dkim=pass (2048-bit key;
unprotected) header.d=nrl.navy.mil header.i=@nrl.navy.mil header.a=rsa-sha256
header.s=s2.dkim header.b=HcDy5BGp
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
b=OpSM0aRJUQIeALOqkOgRhqJ+Umpj2+Ahkd1fVpmHIivf2U7dSFAOb/sxtoi4gsvUHLVEpQ+/Hvtb+z5RnBFk3YGT67tL8KbthKesYHvWnL/A2GywskF2X25SjRQEJH521gEko3Rrn7SqLJ9+g9l+UdTZHmFZw2hUTsvOF00+iH66MELJMWtJcCFmqVlJBAHyjzjDOIqjdnFpVvRtqlWh/1NvL8nHCgaHJTaRoFC1wt5YnrdopmOpm6T/YzW6nyAG0wpIT/+lQ68NP22cAvlkkfNi3IRF8nj+FrP0vT5Dg+O4dIiAOQU7Wuh8nFPIYPwa8iSB0KdNVZVnHQMxaVoIqQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
s=arcselector9901;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
bh=ffEvXR4f6aRCbil1z8eMTbewga43ySHwufD1RDya9iI=;
b=ExVPxw+JDomF9xnpUQoxxojYiulmYFBTgyQUTVMfHI9+e8MCzO3N7CTdHfgtUWvqi9DgnOAdeFTamGD0hQzBFOOvKoG37Hqm01OpT2puSKrnioqKk7gLB1qvSSHfGKB20SmHs+AjclnNeI4f1CcjuHg7EALPLLl0Q7Q9Xuxi3gMzVkB/EryYQ9JH0owvZ2baVpp6Y6dOBSjpLJj7nWmVcsoJPT4/+hN4BBev/pR2qNxPvp4pvlRaVtBSczYMCpvk2RARFFDkbwNgrvx8nSWLui48OAdie93yqE7jZhjW5P2vNVb+SnX3+dWxK1QhayO4XfMbOpa3ZO9aIymLU65jlQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
140.32.59.234) smtp.rcpttodomain=mit.edu smtp.mailfrom=cmf.nrl.navy.mil;
dmarc=pass (p=reject sp=reject pct=100) action=none
header.from=cmf.nrl.navy.mil; dkim=pass (signature was verified)
header.d=nrl.navy.mil; arc=none (0)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=mitprod.onmicrosoft.com; s=selector2-mitprod-onmicrosoft-com;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
bh=ffEvXR4f6aRCbil1z8eMTbewga43ySHwufD1RDya9iI=;
b=jw1kl6Swft6wNlyr0Im2GTYp1v04975P9CDl3MADZCq5qnYkfVfp27W8mtrBXu6U1yT5V+UHLWNy21VspF+mNvJjFxAaYS1dFcrPuoeNr57Jj7wL2idksUrKRjjbkByXjs+/irV2jYeIqIH9VuTdA5bAgqDb+oOG7v0K/1MkjNI=
Authentication-Results: spf=pass (sender IP is 140.32.59.234)
smtp.mailfrom=cmf.nrl.navy.mil; dkim=pass (signature was verified)
header.d=nrl.navy.mil;dmarc=pass action=none header.from=cmf.nrl.navy.mil;
Received-SPF: Pass (protection.outlook.com: domain of cmf.nrl.navy.mil
designates 140.32.59.234 as permitted sender)
receiver=protection.outlook.com; client-ip=140.32.59.234; helo=mf.dren.mil;
pr=C
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nrl.navy.mil;
h=message-id : from :
to : cc : subject : in-reply-to : references : mime-version : content-type
: date; s=s2.dkim; bh=ffEvXR4f6aRCbil1z8eMTbewga43ySHwufD1RDya9iI=;
b=HcDy5BGpxgvyxzzlZ/P4lka8ZxanCn2rDojk/EQeZUgMaJgd+cYDf++IA+NEGAqzTTbt
pMTAE6+vfTtbFDnN+rzjMuz1KDdYs/VJzK8Mp2VsnCT20IjVIg8G7dxnFYq0xNZXY3VK
ndLJSEgrjv8UHC1umxzWjsw5EvEffppjZYIhMzS/+VaTGVOQGchDWJ9i8jEAH3eXtbFW
JROYluN/qdG0XwEIewqjijfJIqIjV+uOPe1dnTNyUgVdOpE7dcyyzQ+gGh34NXLj080O
JtEDnZwrJiT6BcfgWFFKNrNQvNtXsvAscja7mUroce6rbC0QW4l8nwfb7/PMX9x0jFml 4A==
In-Reply-To: <8984fe41-f9a0-434b-a09c-df2bc88125dc@sec4mail.de>
X-Face: "Evs"_GpJ]],xS)b$T2#V&{KfP_i2`TlPrY$Iv9+TQ!6+`~+l)#7I)0xr1>4hfd{#0B4
WIn3jU;bql;{2Uq%zw5bF4?%F&&j8@KaT?#vBGk}u07<+6/`.F-3_GA@6Bq5gN9\+s;_d
gD\SW #]iN_U0 KUmOR.P<|um5yP<ea#^"SJK;C*}fMI;Mv(aiO2z~9n.w?@\>kEpSD@*e`
X-NRLCMF-Spam-Score: () hits=0 User Authenticated
X-NRLCMF-Virus-Scanned:
X-EOPAttributedMessage: 0
X-EOPTenantAttributedMessage: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b:0
X-MS-PublicTrafficType: Email
X-MS-TrafficTypeDiagnostic: DS2PEPF00003442:EE_|SA0PR01MB6108:EE_
X-MS-Office365-Filtering-Correlation-Id: d19e9bdd-0028-4d2c-8c69-08dbe6a9b81f
X-LD-Processed: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b,ExtAddr
X-MS-Exchange-AtpMessageProperties: SA
X-MS-Exchange-SenderADCheck: 0
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:140.32.59.234; CTRY:US; LANG:en; SCL:1; SRV:;
IPV:NLI; SFV:NSPM; H:mf.dren.mil; PTR:mfe.dren.mil; CAT:NONE;
SFS:(13230031)(4636009)(346002)(396003)(136003)(39860400002)(376002)(64100799003)(61400799009)(451199024)(48200799006)(4326008)(26005)(426003)(336012)(2906002)(3480700007)(4744005)(83380400001)(356005)(86362001)(7636003)(956004)(5660300002)(1076003)(786003)(498600001)(70586007)(316002)(68406010)(8676002)(6862004);
DIR:OUT; SFP:1102;
X-Auto-Response-Suppress: DR, OOF, AutoReply
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 16 Nov 2023 13:41:21.5056 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: d19e9bdd-0028-4d2c-8c69-08dbe6a9b81f
X-MS-Exchange-CrossTenant-Id: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b
X-MS-Exchange-CrossTenant-AuthSource: DS2PEPF00003442.namprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: Internet
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA0PR01MB6108
X-OriginatorOrg: mitprod.onmicrosoft.com
X-BeenThere: kerberos@mit.edu
X-Mailman-Version: 2.1.34
Precedence: list
List-Id: The Kerberos Authentication System Mailing List <kerberos.mit.edu>
List-Unsubscribe: <https://mailman.mit.edu/mailman/options/kerberos>,
<mailto:kerberos-request@mit.edu?subject=unsubscribe>
List-Archive: <http://mailman.mit.edu/pipermail/kerberos/>
List-Post: <mailto:kerberos@mit.edu>
List-Help: <mailto:kerberos-request@mit.edu?subject=help>
List-Subscribe: <https://mailman.mit.edu/mailman/listinfo/kerberos>,
<mailto:kerberos-request@mit.edu?subject=subscribe>
X-Mailman-Original-Message-ID: <202311161341.3AGDfILU018263@hedwig.cmf.nrl.navy.mil>
X-Mailman-Original-References: <8984fe41-f9a0-434b-a09c-df2bc88125dc@sec4mail.de>
 by: Ken Hornstein - Thu, 16 Nov 2023 13:41 UTC

>in our organisation we are successfully using PKINIT with RSA 2048
>client certificates for many years. We are now trying to move to ECC
>certificates with the curve secp384r1.
>
>All attempts have been unsuccessful yet.

My reading of the code (I am using a newer version of MIT Kerberos than
you) is that RSA is hard-coded as the signing algorithm. So it looks
like it won't work (I am confident that if I am wrong someone will
correct me). I know that at least at our site we're going to have to
transition to some kind of post-quantum signing algorithm in the future
like many others so I think that eventually this support will be added,
but that doesn't help you now unfortunately.

--Ken

1
server_pubkey.txt

rocksolid light 0.9.8
clearnet tor