[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Does PAC Validation Require External Communication?
As I understand it, if you have access to the server's keytab, then
in principle you can forge credentials for anyone, including non-
existent users (but only for that server). What you suggest would
prevent someone faking the PAC data in a credential, and from
inventing a fake user, but they could still fake the credential.
In other words it wouldn't stop John Jones from presenting a fake
credential for Sam Smith that just happened to include the real PAC
data that Sam would have had if it were really Sam.
Am I missing something?
On May 14, 2007, at 2:59 PM, Andrew Bartlett wrote:
> On Mon, 2007-05-14 at 13:34 -0400, Michael B Allen wrote:
>> This link claims MS' PAC verification can require communication with
>> the DC:
>>
>> http://blogs.msdn.com/spatdsg/archive/2007/03/07/pac-validation.aspx
>>
>> Is this true? If so, services will not be able to authenticate nearly
>> as fast as they otherwise could.
>
> If you think that someone else (not root) has access to the local
> kerberos keytab (or the machine account password), then that user
> could
> spoof their way to any (CIFS) user via the PAC, because they could
> make
> up a fake one. Similarly, as always with kerberos, they could change
> the principal in the ticket, etc.
>
> This can be worked around by validating the PAC to the KDC, but should
> be of concern to anyone who shares that keytab too broadly (eg with
> apache).
>
> On windows, I think a user could run a service, and unless the PAC was
> validated with the KDC, they could use their password to fake their
> way
> down to another more privileged user.
>
> Andrew Bartlett
------------------------------------------------------------------------
The opinions expressed in this message are mine,
not those of Caltech, JPL, NASA, or the US Government.
Henry.B.Hotz@jpl.nasa.gov, or hbhotz@oxy.edu