Skip Menu |
 

To: krb5-bugs@MIT.EDU
Subject: should have option to randomize salt at pw change
From: Ken Raeburn <raeburn@MIT.EDU>
Date: Fri, 20 Jun 2003 16:16:49 -0400
As I'm writing up in the AES draft, always using a known salt string
for a given principal allows an attacker to build up a dictionary of
keys from a password dictionary, and save intermediate results to
re-use even if the iteration count is varied when the password is
changed.

We should have an option to randomize the salt string when the
password is changed. For AES, at least; I don't think it would do any
harm for other encryption types.

Ken
See also http://k5wiki.kerberos.org/wiki/Projects/Random_Salt_Generation for a more detailed
proposal and some analysis.
Fixed by #6964. It's not perfect; the "special" salt type generates 64
bits of salt entropy and there's no way to configure that. But at a
coarse level the feature is there.