Okay,

this is still about TGS. I just noticed, that we have too
many buttons (parameters) to press and try stuff. So I
decided to start from scratch and look only at one
parameter:

arcfour-hmacs default checksum.
Either hmac-md5 or plain-md5 (MD_RSA_MD5).
(I modified crypto-rc4.c for this "parameter change").


Other parameters:
        cipher: "arcfour-hmac" only.
        preauth: enabled
        subkey in TGS: enabled


w2k3-kdc:

        Sending a TGS with hmac-md5 gets me a "Message
        stream modified" from the w2k3-kdc.

        Doing the same with plain-md5 gets me a response,
        that shishi can't decrypt.

heimdal-kdc:
        Version: 0.7.2 from Debian/testing

        Both variants work and I can't really discover any
        difference.

        Both give this warning from shishi at TGS-time:

        "libshishi: warning: KDC bug: Reply encrypted using wrong key."


>From my limited point of view, this looks like shishi and
heimdal are consistent to each other with the hmac-md5, but
shishi and w2k3 do not seem to share this.

This is particular confusing to me, as arcfour-hmac was
invented by the guys at ms. So either their spec isn't
correct or heimdal and you seem to have misread it (no
reproach intended!).

So what next?


    Elrond


_______________________________________________
Help-shishi mailing list
[email protected]
http://lists.gnu.org/mailman/listinfo/help-shishi

Reply via email to