Kerberos authentication and its hash values
Since you don't send the actual password over the wire how does the server know how to compare the same hash as the client provided? Does the client machine take the password the user provided and hash it and then send that hash value to the server and compare that hash value with the one that the server has stored? If thats the case, couldn't someone use a replay attack with the same hash value as the user and get authenticated to the server and user those credentials? Also, what if a user wants to change their password to something else, wouldn't that password be sent across the wire to be stored on the server?
Comments
-
Webmaster Admin Posts: 10,292 Adminninjaz wrote:Since you don't send the actual password over the wire how does the server know how to compare the same hash as the client provided? Does the client machine take the password the user provided and hash it and then send that hash value to the server and compare that hash value with the one that the server has stored? If thats the case, couldn't someone use a replay attack with the same hash value as the user and get authenticated to the server and user those credentials?ninjaz wrote:Also, what if a user wants to change their password to something else, wouldn't that password be sent across the wire to be stored on the server?
-
keatron Member Posts: 1,213 ■■■■■■□□□□Change password is a request/reply protocol that includes a KRB_PRIV (kerberos privelage) message that contains the new password for the user. So in my opinion the short answer is yes. It is sent across.
-
Webmaster Admin Posts: 10,292 AdminThanks for the insight Keatron. KRB_PRIV was my missing link. I agree btw, the password is sent across the wire when a user changes it. KRB_PRIV lead to some better results:
www.faqs.org/rfcs/rfc3244.html
www.freesoft.org/CIE/RFC/1510/38.htm
www.freesoft.org/CIE/RFC/1510/39.htm