OpenBSD Journal

y Patches 013 and 026 address Kerb4 weakness

Contributed by jose on from the waste-not-want-not dept.

Thanks to the heads up from Todd Miller:
There is a cryptographic weaknesses in the Kerberos v4 protocol (this is not something that is fixable in Kerberos v4). Sites still using Kerberos v4 should migrate to Kerberos v5. Kerberos v5 does not have this weakness, but since it contains v4 to v5 translation services it is still possible to exploit the v4 protocol defect.

For more information, please see the MIT Advisory .

The following patches cause Kerberos v4 requests from foreign realms to be ignored unless support for this is explicitly enabled ....

The aforementioned patches have already been applied to the 3.1 and 3.2 -stable branches.

The files for 026_kerberos.patch (for 3.1-stable) and 013_kerberos.patch (for 3.2-stable) are making their way around the FTP servers. Thank you, Todd.

(Comments are closed)


Credits

Copyright © - Daniel Hartmeier. All rights reserved. Articles and comments are copyright their respective authors, submission implies license to publish on this web site. Contents of the archive prior to as well as images and HTML templates were copied from the fabulous original deadly.org with Jose's and Jim's kind permission. This journal runs as CGI with httpd(8) on OpenBSD, the source code is BSD licensed. undeadly \Un*dead"ly\, a. Not subject to death; immortal. [Obs.]