> From: tech-boun...@lists.lopsa.org [mailto:tech-boun...@lists.lopsa.org]
> On Behalf Of Edward Ned Harvey (lopser)
> 
> The client sent the
> password to the KDC.

BTW, Kerberos is definitely not the problem I'm interested in addressing. The 
reason Kerberos came up in this thread was to suggest I look at it and see how 
they work (implying they already know how to do authentication without password 
exposure). I first looked into those details about 2 years ago, because I 
mistakenly believed Kerberos did exposureless authentication, and I thought we 
could use their stuff, or learn from them. Kerberos was a dead-end for us, but 
lots of zero-knowledge password proof (ZKPP) methods do exist, in particular, 
all the variants of PAKE. All of cbcrypt boils down to two sections: (a) 
address the salt exposure problem, and (b) prove knowledge of the derived 
salted stretched hash. PAKE could be used in part(b), instead of authenticating 
with ECDH or ECDSA, but since you're already inside a TLS channel and the 
server has the salted stretched hash, the benefit of not exposing the salted 
stretched hash inside the TLS channel is minimal. It's a nice fea
 ture, so we might adopt PAKE for part(b) in some future version of cbcrypt. 
Part(a) is new, no matter what. The salt exposure problem was never addressed 
by any of the variants of PAKE (none that I've found).
_______________________________________________
Tech mailing list
Tech@lists.lopsa.org
https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to