[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Sam Hartman <hartmans@debian.org>] Re: Interoperability betweenMIT and Heimdal wrt to MIC verification?



Hi.  There has been a bit of discussion on krbdev@mit.edu about a bug
reported by Olaf Kirch <okir@suse.de> in Heimdal's handling of get_mic
for the 3des GSSAPI support.

Some MIT users were running into the problem and we wanted to look at
whether we could add compatibility.  We decided against.




-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1



I've looked at the patch supplied and apparently what is happening is
that Heimdal does not use an IV for the sequence number in 3des MICs.

Unfortunately, the IV is part of the security of an RFC 1964 GSSAPI
mechanism's sequence number.  The IV binds the sequence number to the
packet checksum to prevent an attacker from glueing a sequence number
from one packet into another.  Without this binding, GSSAPI's replay
detection is broken.

As such, The MIT Kerberos Team has decided not to implement
compatibility in our gss_verify_mic with the current Heimdal
behavior.


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.0 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.8 <http://mailcrypt.sourceforge.net/>

iD8DBQE9yaAo/I12czyGJg8RAstWAJ9uNr7yfO95Zd/Thp3mi7dRK2zpnQCfd8y/
wOe3LRNzCG58MKbDzm+limo=
=sEOe
-----END PGP SIGNATURE-----
_______________________________________________
krbdev mailing list             krbdev@mit.edu
http://mailman.mit.edu/mailman/listinfo/krbdev