Breaking and fixing public-key Kerberos

  • Authors:
  • Iliano Cervesato;Aaron D. Jaggard;Andre Scedrov;Joe-Kai Tsay;Christopher Walstad

  • Affiliations:
  • Carnegie Mellon University in Qatar, P.O. Box 42866, Doha, Qatar;DIMACS, Rutgers University, 96 Frelinghuysen Rd., Piscataway, NJ 08854;University of Pennsylvania, Department of Mathematics, 209 S. 33rd St., Philadelphia, PA 19104, USA;University of Pennsylvania, Department of Mathematics, 209 S. 33rd St., Philadelphia, PA 19104, USA;University of Pennsylvania, School of Engineering and Applied Science, 220 S. 33rd St., Philadelphia, PA 19104, USA

  • Venue:
  • Information and Computation
  • Year:
  • 2008

Quantified Score

Hi-index 0.01

Visualization

Abstract

We report on a man-in-the-middle attack on PKINIT, the public key extension of the widely deployed Kerberos 5 authentication protocol. This flaw allows an attacker to impersonate Kerberos administrative principals (KDC) and end-servers to a client, hence breaching the authentication guarantees of Kerberos. It also gives the attacker the keys that the KDC would normally generate to encrypt the service requests of this client, hence defeating confidentiality as well. The discovery of this attack caused the IETF to change the specification of PKINIT and Microsoft to release a security update for some Windows operating systems. We discovered this attack as part of an ongoing formal analysis of the Kerberos protocol suite, and we have formally verified several possible fixes to PKINIT-including the one adopted by the IETF-that prevent our attack as well as other authentication and secrecy properties of Kerberos with PKINIT.