Speaking purely personally, I like two possibilities:  a) smart cards  
with PKINIT, or b) a software-only OTP like S/KEY that would be built  
into the KDC and look like a normal password to the client side.  (I  
think the latter qualifies as "key generating" in your nomenclature.)

If I had my way, any vendor would need to convince me that they have  
solved the KDC robustness problem.  I have a hard time imagining a  
vendor being able to make money solving this problem unless the  
market was bigger than just Kerberos servers.

I'm not sure I know how to solve the problem.  The solution would  
need a really robust sync service like UBIK, but fast enough that it  
never times out a traditional kinit, even with multiple,  
transcontinental kdc's.

Is it worth bringing this up on the IETF list?

On Jun 4, 2007, at 3:20 PM, Nicolas Williams wrote:

> On Mon, Jun 04, 2007 at 03:15:40PM -0700, Henry B. Hotz wrote:
>> IMO the interesting technical problem w.r.t. OTP is how you create
>> intra-kdc state so a password can't be sniffed and re-used with a
>> different KDC.  You need to do this in a way that does not degrade
>> the robustness of the service.
>
> I thought the interesting problem was how to protect the  
> authentication
> step given that most OTPs are non-key-generating or, if they do  
> generate
> keys, they generate weak ones.  The problem you mention is the OTP
> vendor's problem, not the KDC implementor's.
>
> Nico
> -- 

------------------------------------------------------------------------
The opinions expressed in this message are mine,
not those of Caltech, JPL, NASA, or the US Government.
Henry.B.Hotz at jpl.nasa.gov, or hbhotz at oxy.edu



Reply via email to