We are using MIT Kerberos with PKINIT using certificates using the secp256k1 
curve.  It works fine.  I believe the certificates can be signed with any 
elliptic curve that openssl knows how to verify.

Internally the MIT implementation uses ephemeral Diffie-Hellman on RSA.  
Perhaps that is what Greg meant with his "no" answer?
________________________________________
From: kerberos-boun...@mit.edu <kerberos-boun...@mit.edu> on behalf of Rick van 
Rein <r...@openfortress.nl>
Sent: Monday, April 3, 2017 8:36 AM
To: k...@pallissard.net
Cc: kerberos@mit.edu
Subject: Re: elliptic curve pkinit?

Hey,


> Has MIT kerberos implemented pkinit with elliptic curve certs/keys?  Some 
> initial searching points me to an informational ietf RFC posted out there, 
> but nothing official.

FWIW, in the ARPA2 project we're working on Realm Crossover (based on
DANE/DNSSEC) which uses ECDHE.  The protocol is almost compatible with
PKINIT, but not quite on account of a technicality (no tickets in the
reply).  The work leaves openings for client-to-KDC access, but doesn't
fill them in.


http://k5wiki.kerberos.org/wiki/Projects/Realm_Crossover_between_KDCs
http://realm-xover.arpa2.net/kerberos.html

A glimpse at upcoming software (and the earlier PoC) are on
https://github.com/arpa2/kxover

-Rick
________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to