Hello,

GSSAPI-based protocols have an option of challenging a client with a counter 
value.  This is done after the client submits a ticket.

Looking at SPNEGO (and probably other protocols as well) I see that the server 
can take the initiative for an GSSAPI exchange, and when doing so, it could 
already challenge the client.

The way I see it, asking a client to decrypt *anything* is possible, as long as 
the result is unpredictable to the client of course.  For instance, a random 
byte series could be created by the server and sent to the client for 
decryption.  Whatever the block cipher makes of that, is the proper answer; the 
server can make the same computation when it receives the ticket (with the 
session key) and the response to the challenge (decrypted with the session key).

This would save a back-and-forth hop.  Why is this not done?  Are there 
cryptographic reasons that I am missing?

Thanks,
 -Rick
________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to