Rocksolid Light

Welcome to novaBBS (click a section below)

mail  files  register  newsreader  groups  login

Message-ID:  

Linux - Das System fuer schlaue Maedchen ;) -- banshee


devel / comp.protocols.kerberos / Re: RFC 4121 & acceptor subkey use in MIC token generation

SubjectAuthor
o Re: RFC 4121 & acceptor subkey use in MIC token generationKen Hornstein

1
Re: RFC 4121 & acceptor subkey use in MIC token generation

<mailman.28.1698352554.2263420.kerberos@mit.edu>

  copy mid

https://www.novabbs.com/devel/article-flat.php?id=404&group=comp.protocols.kerberos#404

  copy link   Newsgroups: comp.protocols.kerberos
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!tncsrv06.tnetconsulting.net!.POSTED.mailman.mit.edu!not-for-mail
From: kenneth....@nrl.navy.mil (Ken Hornstein)
Newsgroups: comp.protocols.kerberos
Subject: Re: RFC 4121 & acceptor subkey use in MIC token generation
Date: Thu, 26 Oct 2023 14:27:56 -0400
Organization: TNet Consulting
Lines: 19
Message-ID: <mailman.28.1698352554.2263420.kerberos@mit.edu>
References: <202310241950.39OJoa0Z000708@hedwig.cmf.nrl.navy.mil>
<3db2752e-565e-1f64-b354-9031a2fe9334@mit.edu> <ZTiT0ub2uv5A/b4E@ubby21>
<202310251251.39PCpTqc026799@hedwig.cmf.nrl.navy.mil>
<ZTk62q0DIAZmW0eL@ubby21>
<CALF+FNwtDrQ0d+a=zsXyiYq6rhOiXXkqoxUnscwum0Q0wchLJQ@mail.gmail.com>
<202310261741.39QHfgIl030099@hedwig.cmf.nrl.navy.mil>
<ZTqtQYPlzdpQGyr+@ubby21>
<202310261827.39QIRu4Q000307@hedwig.cmf.nrl.navy.mil>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Injection-Info: tncsrv06.tnetconsulting.net; posting-host="mailman.mit.edu:18.7.21.50";
logging-data="13629"; mail-complaints-to="newsmaster@tnetconsulting.net"
Cc: kerberos@mit.edu
To: Nico Williams <nico@cryptonector.com>
DKIM-Filter: OpenDKIM Filter v2.11.0 unknown-host (unknown-jobid)
Authentication-Results: mailman.mit.edu;
dkim=pass (1024-bit key, unprotected) header.d=mitprod.onmicrosoft.com
header.i=@mitprod.onmicrosoft.com header.a=rsa-sha256
header.s=selector2-mitprod-onmicrosoft-com header.b=DJbah338;
dkim=pass (2048-bit key,
unprotected) header.d=nrl.navy.mil header.i=@nrl.navy.mil header.a=rsa-sha256
header.s=s2.dkim header.b=Mv6+NSOe
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
b=VU8KSta4uzDegbejeDq1G3JvQB/awEPcnV1WadqCPi3SEMOvU7NE92mhdr/DRqhIA4rKrZTKWG5ih5eaGTrZa7RHhI7u9Jz4pyg6wdZjnu8RqFD707RDiIG+uyvtfjNtGU+nceB4MbdFyJou55USP6umMSQujE3rgBcehwCwgXEIol0MgHKIYu4ckkry1pZteuPcRJbQoGarPz7iKc+IxsHDT8mCjOcqnVCfhL7Fk7RXpcN1o9Sp5dRaSEB4a35YTB2xIXKN6+ezLHdVrCBaUIw4+9Ar0L4Ax+6qd9UWgeUVSmE49OpizbRw7AzJeULeMnEwB6Z+3MMkt1MlFlYXgg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
s=arcselector9901;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
bh=6we11eIDWh19RSIdo7FRriilleTWZvlGjn6b646phaM=;
b=mu5eQB55wpHE6FVKAu24BU4uIPEZhNEdX64r54ZKP5/jMZc761/nptpThW7AwyScrBQQ/RF+JuP90jvmZ+g5Vlc32ltCWjOnXZY6emXgSogfwInDZ/4zn/wqahJa5h8msKyTm7hxWVthpYni7M3CGPfojl6bCnp2I/0avNp9TKVhxqLzQ6/G2/O/Adn6TkzZRY1Q8IoKjGlffM1vlDAGhA3rLGJjZQ23N1a6m/WW5YFDuYsysaNMlymtdziNlPZYIcja5jkhqaMI7qOn9R8T+0K7bnWRfMlf9JGsjSlnhDXBSrS8VMZkphjH3dVO5pCurPEkcqVECpWq1BTtBEld+Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
140.32.61.234) smtp.rcpttodomain=mit.edu smtp.mailfrom=nrl.navy.mil;
dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nrl.navy.mil;
dkim=pass (signature was verified) header.d=nrl.navy.mil; arc=none (0)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=mitprod.onmicrosoft.com; s=selector2-mitprod-onmicrosoft-com;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
bh=6we11eIDWh19RSIdo7FRriilleTWZvlGjn6b646phaM=;
b=DJbah338x05NuP5BpIJcO9Tm+hgW5+OOFu+MryN12hWU5NeHUTvA4KPt3E9rVwQfARQqBml2alIzhMBRuVIzdY4KnxAR/ToYFnc7M3civVmG0CFBkxPnfKScI8YOVkSa51ekJUBQBxB6ikc3eDhjBkC4p2ml21S8vMBEQSXUkDU=
Authentication-Results: spf=pass (sender IP is 140.32.61.234)
smtp.mailfrom=nrl.navy.mil; dkim=pass (signature was verified)
header.d=nrl.navy.mil;dmarc=pass action=none header.from=nrl.navy.mil;
Received-SPF: Pass (protection.outlook.com: domain of nrl.navy.mil designates
140.32.61.234 as permitted sender)
receiver=protection.outlook.com;
client-ip=140.32.61.234; helo=mf.dren.mil; pr=C
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nrl.navy.mil;
h=message-id : from :
to : cc : subject : in-reply-to : references : mime-version : content-type
: date; s=s2.dkim; bh=6we11eIDWh19RSIdo7FRriilleTWZvlGjn6b646phaM=;
b=Mv6+NSOeedopUNagq6mJ/O4ROjMIjeQNekIKKvhf46aERAqYFMvnWynytgYhED0nqplh
HIhYm3N45jO4bGhYV9+DmkdIxCGz31WW5FKRhWXms6cdhynkSIdyiwC13gU/cf8c2cmJ
g1IGMDoLpicC9FtBajyErO1OG7JpSB+i9PYEwjafGlli3sxyW74FWAiiq+AsBYQ/3k5C
+R4OSdyYJIYliUhXm9iDWG7BZuqf89P+TmKehYPNsu7soEGX9RlcRCttLbIw8CpjVb69
yqwbWEAm+YmcvW4aFCsxJx3mIMuFJ+Bzs21rKdYEIsJkuwSlrSGGmUpFLT+LWt8BB0iG 3g==
In-Reply-To: <ZTqtQYPlzdpQGyr+@ubby21>
X-Face: "Evs"_GpJ]],xS)b$T2#V&{KfP_i2`TlPrY$Iv9+TQ!6+`~+l)#7I)0xr1>4hfd{#0B4
WIn3jU;bql;{2Uq%zw5bF4?%F&&j8@KaT?#vBGk}u07<+6/`.F-3_GA@6Bq5gN9\+s;_d
gD\SW #]iN_U0 KUmOR.P<|um5yP<ea#^"SJK;C*}fMI;Mv(aiO2z~9n.w?@\>kEpSD@*e`
X-NRLCMF-Spam-Score: () hits=0 User Authenticated
X-NRLCMF-Virus-Scanned:
X-EOPAttributedMessage: 0
X-EOPTenantAttributedMessage: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b:0
X-MS-PublicTrafficType: Email
X-MS-TrafficTypeDiagnostic: DS1PEPF00017090:EE_|LV2PR01MB7791:EE_
X-MS-Office365-Filtering-Correlation-Id: 89fd2a81-782e-4c95-4cc2-08dbd651488e
X-LD-Processed: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b,ExtAddr
X-MS-Exchange-AtpMessageProperties: SA
X-MS-Exchange-SenderADCheck: 0
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:140.32.61.234; CTRY:US; LANG:en; SCL:1; SRV:;
IPV:NLI; SFV:NSPM; H:mf.dren.mil; PTR:mfw.dren.mil; CAT:NONE;
SFS:(13230031)(4636009)(396003)(136003)(39860400002)(376002)(346002)(61400799006)(48200799006)(64100799003)(451199024)(498600001)(83380400001)(26005)(1076003)(956004)(336012)(426003)(316002)(2906002)(4744005)(5660300002)(68406010)(70586007)(6862004)(4326008)(8676002)(86362001)(356005)(7636003)(786003);
DIR:OUT; SFP:1102;
X-Auto-Response-Suppress: DR, OOF, AutoReply
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Oct 2023 18:27:59.8850 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 89fd2a81-782e-4c95-4cc2-08dbd651488e
X-MS-Exchange-CrossTenant-Id: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b
X-MS-Exchange-CrossTenant-AuthSource: DS1PEPF00017090.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: Internet
X-MS-Exchange-Transport-CrossTenantHeadersStamped: LV2PR01MB7791
X-OriginatorOrg: mitprod.onmicrosoft.com
X-Mailman-Approved-At: Thu, 26 Oct 2023 16:35:53 -0400
X-BeenThere: kerberos@mit.edu
X-Mailman-Version: 2.1.34
Precedence: list
List-Id: The Kerberos Authentication System Mailing List <kerberos.mit.edu>
List-Unsubscribe: <https://mailman.mit.edu/mailman/options/kerberos>,
<mailto:kerberos-request@mit.edu?subject=unsubscribe>
List-Archive: <http://mailman.mit.edu/pipermail/kerberos/>
List-Post: <mailto:kerberos@mit.edu>
List-Help: <mailto:kerberos-request@mit.edu?subject=help>
List-Subscribe: <https://mailman.mit.edu/mailman/listinfo/kerberos>,
<mailto:kerberos-request@mit.edu?subject=subscribe>
X-Mailman-Original-Message-ID: <202310261827.39QIRu4Q000307@hedwig.cmf.nrl.navy.mil>
X-Mailman-Original-References: <202310241950.39OJoa0Z000708@hedwig.cmf.nrl.navy.mil>
<3db2752e-565e-1f64-b354-9031a2fe9334@mit.edu> <ZTiT0ub2uv5A/b4E@ubby21>
<202310251251.39PCpTqc026799@hedwig.cmf.nrl.navy.mil>
<ZTk62q0DIAZmW0eL@ubby21>
<CALF+FNwtDrQ0d+a=zsXyiYq6rhOiXXkqoxUnscwum0Q0wchLJQ@mail.gmail.com>
<202310261741.39QHfgIl030099@hedwig.cmf.nrl.navy.mil>
<ZTqtQYPlzdpQGyr+@ubby21>
 by: Ken Hornstein - Thu, 26 Oct 2023 18:27 UTC

>> As a side note, my impression is that gss-keyex has fallen out of favor,
>> and at least for us part of the problem is the unfortunate decision
>> to use MD5 in that protocol. You and I both know that the use of MD5
>> in there isn't security related, but if you live in a FIPS world
>> then any use of MD5 is a "challenge".
>
>What MD5? It's used for generating a mechanism name, which has no
>security implications. You can hardcode the OID->name mappings so you
>don't invoke MD5.

Ever hear the political adage, "If you're explaining yourself, you're
losing"?. The same adage applies when talking to security people,
especially the non-technical ones. The common gss-keyex code out there
calls the OpenSSL MD5 function at runtime, and some of the distributions
that do ship the gss-keyex code (RedHat) decided to simply disable
gss-keyex code when FIPS is turned on. So yes, you CAN hardcode the
OID->name mappings, but it seems that nobody actually does that.

--Ken

1
server_pubkey.txt

rocksolid light 0.9.8
clearnet tor