Questions on kerb 4 vice kerb 5

Henry B. Hotz hotz at jpl.nasa.gov
Tue Nov 20 21:07:18 CET 2001


At 9:23 AM -0500 11/20/01, Ted Anderson wrote:
>On Mon, 19 Nov 2001 14:14:46 -0800 "Henry B. Hotz" <hotz at jpl.nasa.gov> wrote:
>>  > I am not quite sure what you mean by the weel-known replay
>  > > vulnerability,


>  > Since I guess I've exhausted the store of free technical advice on
>>  the subject can I ask people for a reference to the rx protocol so I
>>  can concievably figure this out for myself?
>
>Well, I kind of hate the implication that I've been tapped out already,
>though I applaud your willingness to track down the answer for yourself.

I didn't mean that the way it came out!  More like I've gotten as 
much free help (thanks everyone!) as I can expect and it's time to do 
the rest of the work myself.  Also I'm not being as clear about what 
I'm trying to accomplish as I should.

>I am not at all current the state of documentation for the kaserver and
>Rx.  However, since I wrote the former and have dabbled in the latter on
>and off for more than a decade, I feel sure I could answer your question
>if only I understood it.

Fair enough, and thanks for the offer.  I should have paid attention 
to the domain on your email address. ;-)

[Excellent but long description of k4 and rx protocol (lack of) 
vulnerabilities deleted.]

Let me start over.

Say I've got an AFS server behind a firewall.  I'll live with the 
data being sent in the clear though the firewall (because that 
specific data shouldn't be as sensitive), but I absolutely want to 
guarantee that nobody outside can use the "well-known vulnerability 
in k4" to get at the rest of the stuff on that server.  (That there 
was a vulnerability and that it had something to do with capturing 
and replaying part of someone else's authentication dialog is as much 
as I remembered.)  The naive solution I first asked about was can I 
just block rx and k4 at the firewall and allow k5 through?

(I should also mention an ulterior motive of getting JPL to implement 
a k5 server to ease implementation of single-sign-in with the OS's 
that bundle MIT kerberos code like MacOS X and Solaris 8.)

The answer I got from Magnus was that I could force the tgt to come 
from a k5 server, but the AFS clients still needed to talk rx to the 
AFS servers.  The badly posed question I followed up with was:  is 
that good enough or does rx have enough of the same k4 vulnerability 
that you could still get an AFS token without a tgt?

If I understand your answer then the actual replay vulnerabilities of 
k4 are pretty limited and rx doesn't even have those.  Probably I 
should block UDP port 750 at the firewall and leave it at that. 
(Correct, or should I block TCP as well?)  That's different from my 
going-in belief, but reassuring.

(Of course it means I can't use the vulnerability to force JPL to 
upgrade to k5.)

Thanks for the reference.  The vulnerability I vaguely remembered was 
reference 8 of your reference.  The paper is much more general than I 
had thought, and some of the problems do not apply to k4 the way it 
is used by AFS.
-- 
The opinions expressed in this message are mine,
not those of Caltech, JPL, NASA, or the US Government.
Henry.B.Hotz at jpl.nasa.gov, or hbhotz at oxy.edu





More information about the Arla-drinkers mailing list