Thread: Removal of krb4 support...

Removal of krb4 support...

From
Sean Chittenden
Date:
The attached patch completely removes krb4 support.  The advisory
listed below contains details, but suffice it to say the krb4 protocol
is fundamentally flawed and its use should be highly pessimized, to
the point of complete removal if database integrity is valued.  Taken
from the advisory, the twenty second summary of the krb4 vulnerability
is:

    A cryptographic weakness in version 4 of the Kerberos protocol
    allows an attacker to use a chosen-plaintext attack to impersonate
    any principal in a realm.  Additional cryptographic weaknesses in
    the krb4 implementation included in the MIT krb5 distribution
    permit the use of cut-and-paste attacks to fabricate krb4 tickets
    for unauthorized client principals if triple-DES keys are used to
    key krb4 services.  These attacks can subvert a site's entire
    Kerberos authentication infrastructure.

    Kerberos version 5 does not contain this cryptographic
    vulnerability.  Sites are not vulnerable if they have Kerberos v4
    completely disabled, including the disabling of any krb5 to krb4
    translation services.

For full details:

http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2003-004-krb4.txt

The attached patch includes references to the above advisory as well
as updated release notes and client auth pointing out that support for
krb4 has been removed.

To date, krb4 support has been removed from all four of the BSDs
(Free, Net, Open, and Darwin) and krb4 support has been disabled in
Heimdal and MITs KDCs.  The extent to which the protocol has been
removed from other products is unknown at this time, but is likely
that universally in support is being deorbited quickly.  Commercial
vendors were 2/3rds of the way through their zero day notification for
removal of krb4 when someone posted the vulnerability two months
before the agreed upon disclosure date.

The impact of this patch should be minimal as organizations should
have already moved to krb5 several years ago.

-sc

--
Sean Chittenden

Attachment

Re: Removal of krb4 support...

From
Peter Eisentraut
Date:
Sean Chittenden writes:

> The attached patch completely removes krb4 support.

As long as people are still using it, I see no reason.  Just the other day
someone reported that he was trying to get it to work in his environment.

--
Peter Eisentraut   peter_e@gmx.net


Re: Removal of krb4 support...

From
Tom Lane
Date:
Peter Eisentraut <peter_e@gmx.net> writes:
> Sean Chittenden writes:
>> The attached patch completely removes krb4 support.

> As long as people are still using it, I see no reason.  Just the other day
> someone reported that he was trying to get it to work in his environment.

I was feeling itchy about that too.  How about just adding some
disclaimers to the docs that Kerberos 4 has known security flaws?

I wouldn't mind pulling it from 7.5, if the 7.4 docs say we are going to
and no one complains.

            regards, tom lane

Re: Removal of krb4 support...

From
Sean Chittenden
Date:
> >> The attached patch completely removes krb4 support.
>
> > As long as people are still using it, I see no reason.  Just the
> > other day someone reported that he was trying to get it to work in
> > his environment.

There are kits running around for krb4, I hope their DB isn't publicly
available.

> I was feeling itchy about that too.  How about just adding some
> disclaimers to the docs that Kerberos 4 has known security flaws?
>
> I wouldn't mind pulling it from 7.5, if the 7.4 docs say we are
> going to and no one complains.

If you'd like, I can submit a quick patch to raise a warning if the
auth type is krb4 as a depreciation notice and something for the docs.

Sorry if this came out of the blue, the topic came up yesterday at
lunch so I submitted something to take care of the prob.  At this
point in time, there is no reason for anyone to be using krb4.  -sc

--
Sean Chittenden