On Fri, Oct 09, 2015 at 10:47:40AM +0000, Edward Ned Harvey (lopser) wrote:
> OMG, how do you think it has the password, if the password was never
> sent? It was sent in a previous session. 

Not necessarily.  The Kerberos password might have been set by the
realm admin and handed to the end user on a post-it note.  It might
have been set directly on a secure terminal connected to a KDC in the
security officer's office.  It really depends on the security policy
of the Kerberos admins.

The point is:  The password is never sent to the untrusted web
server.  Barring some implementation-specific instances, it's never
sent to the KDCs.

The reason why I think that Brandon and I are really pushing this
concept is that this is pretty well-established crypto.  It works
really well.  It has its downsides -- and I think if I were arguing
for your position, I'd be familiar enough with the state of the art to
be able to voice a problem with using SPNEGO.

Here's one:

Using SPNEGO requires that the remote service have its own kerberos
infrastructure set up, either in the same realm as the user, or with
two realms that allow cross-realm trust.  I can see it working fine
for an enterprise environment (particularly with AD), but Joe End User
is most likely not in a realm by default.

Perhaps you could use something like OpenID or Shibboleth, where the
endpoint is authenticated with SPNEGO, but it's still going to require
some complexity that has a steep learning curve for the general user.


-- 
Jonathan Billings <billi...@negate.org>
_______________________________________________
Tech mailing list
Tech@lists.lopsa.org
https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to