BLU Discuss list archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Discuss] Why the dislike of X.509?
- Subject: [Discuss] Why the dislike of X.509?
- From: warlord at MIT.EDU (Derek Atkins)
- Date: Thu, 28 Aug 2014 13:40:21 -0400
- In-reply-to: <53FE1FCB.7010405@gmail.com> (Richard Pieri's message of "Wed, 27 Aug 2014 14:13:31 -0400")
- References: <53F9F6B9.4060505@stephenadler.com> <20140824161132.GE14848@randomstring.org> <be314521ab6bebb6add54d706b042f01.squirrel@mail.mohawksoft.com> <53FA1C3B.70908@gmail.com> <53FB19E5.4080602@aeminium.org> <53FB4A5D.2030305@gmail.com> <CA+h9Qs5GnC6d1ejBQC=crtHwxoDiFWo4Kn+xjt0eiA8Kr733_A@mail.gmail.com> <53FB70E6.50706@gmail.com> <sjmmwarchcd.fsf@securerf.ihtfp.org> <53FE1FCB.7010405@gmail.com>
Richard Pieri <richard.pieri at gmail.com> writes: > As an aside: > > On 8/26/2014 1:04 PM, Derek Atkins wrote: >> You (or someone) also brought up Kerberos. Kerberos *IS* a key escrow >> system. If an attacker breaks into your KDC they literally have all the >> keys to your kingdom. Not only can they impersonate anyone, they can go > > I operate a Kerberos realm. I am not able to tell my users their > passwords. I don't have them. Kerberos stores one-way hashes of users' > passwords. I could brute force the database with sufficient time but > that is steps removed from having the actual keys in my hands. Passwords? We don't need no stinking passwords! You don't need to know your user's passwords, you have access to their keys! If I could dump a copy of your KDC database then I could then impersonate any user (or server!) on your network and read all their traffic. I don't need to know their passwords to do that. > A bad actor can do quite a bit with a compromised KDC but these things > are well known. Steps to prevent compromise are well documented as are > steps to identify compromised KDCs and mitigate the damage that they can do. A bad actor can do *everything* with a compromised KDC. Yes, there are steps to prevent compromise, just like there are steps to prevent compromise of an X.509 CA. The main difference here is that if I compromise your KDC I can now read all the previously-encrypted traffic, whereas with a compromised X.509 CA all I can do is impersonate players in the future. I.e., a KDC Capture gives you *past* communications! -derek -- Derek Atkins, SB '93 MIT EE, SM '95 MIT Media Laboratory Member, MIT Student Information Processing Board (SIPB) URL: http://web.mit.edu/warlord/ PP-ASEL-IA N1NWH warlord at MIT.EDU PGP key available
- Follow-Ups:
- [Discuss] Why the dislike of X.509?
- From: richard.pieri at gmail.com (Richard Pieri)
- [Discuss] Why the dislike of X.509?
- References:
- [Discuss] vnc
- From: adler at stephenadler.com (Stephen Adler)
- [Discuss] vnc
- From: dsr at randomstring.org (Dan Ritter)
- [Discuss] vnc
- From: markw at mohawksoft.com (markw at mohawksoft.com)
- [Discuss] vnc
- From: richard.pieri at gmail.com (Richard Pieri)
- [Discuss] vnc
- From: nuno at aeminium.org (Nuno Sucena Almeida)
- [Discuss] Why the dislike of X.509?
- From: richard.pieri at gmail.com (Richard Pieri)
- [Discuss] Why the dislike of X.509?
- From: jabr at blu.org (John Abreau)
- [Discuss] Why the dislike of X.509?
- From: richard.pieri at gmail.com (Richard Pieri)
- [Discuss] Why the dislike of X.509?
- From: warlord at MIT.EDU (Derek Atkins)
- [Discuss] Why the dislike of X.509?
- From: richard.pieri at gmail.com (Richard Pieri)
- [Discuss] vnc
- Prev by Date: [Discuss] vnc
- Next by Date: [Discuss] firewalld
- Previous by thread: [Discuss] Why the dislike of X.509?
- Next by thread: [Discuss] Why the dislike of X.509?
- Index(es):