2007
DOI: 10.1007/978-3-540-77505-8_13
|View full text |Cite
|
Sign up to set email alerts
|

Breaking and Fixing Public-Key Kerberos

Abstract: We report on a man-in-the-middle attack on PKINIT, the public key extension of the widely deployed Kerberos 5 authentication protocol. This flaw allows an attacker to impersonate Kerberos administrative principals (KDC) and end-servers to a client, hence breaching the authentication guarantees of Kerberos. It also gives the attacker the keys that the KDC would normally generate to encrypt the service requests of this client, hence defeating confidentiality as well. The discovery of this attack caused the IETF … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2008
2008
2013
2013

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(12 citation statements)
references
References 33 publications
(36 reference statements)
0
12
0
Order By: Relevance
“…In 2008, Cervesato et al [16] pointed out that manin-the-middle attack could break down the Kerberosbased systems.…”
Section: Kerberos-based Information Systemmentioning
confidence: 99%
“…In 2008, Cervesato et al [16] pointed out that manin-the-middle attack could break down the Kerberosbased systems.…”
Section: Kerberos-based Information Systemmentioning
confidence: 99%
“…The adversary they consider is typically a Dolev-Yao-style adversary [16], i.e., is assumed to control the entire network. The PKINIT protocol, including its Diffie-Hellman variant, has already been proven secure under that adversary model [2,8,12,23].…”
Section: Related Workmentioning
confidence: 99%
“…Kerberos is an authentication and key distribution protocol originally proposed in 1988, and has a long history of attacks and updates (see, for example, [2,12] and the references therein). Its main goal is to establish fresh session keys between users and servers and, as a result, enable users to log into multiple servers that belong to a common infrastructure.…”
Section: Overview Of the Dh Variant Of Pkinitmentioning
confidence: 99%
“…This man-in-the-middle attack is the staple example for protocol verification; it is well known in the formal methods research community, and many tools can discover it. Still, for instance, Cervesato et al (2008) recently discovered that the IETF issued a public-key variant of Kerberos, shipped by multiple vendors, with essentially the same design flaw. -As an example of a cryptographic flaw, consider the padding-oracle attacks on unauthenticated ciphertexts, discovered by Bleichenbacher (1998) and Vaudenay (2002).…”
Section: Verifying Protocol Implementationsmentioning
confidence: 99%