{"id":1043,"date":"2016-03-07T16:33:09","date_gmt":"2016-03-08T00:33:09","guid":{"rendered":"https:\/\/www.cloudinsidr.com\/content\/?p=1043"},"modified":"2016-03-22T14:15:20","modified_gmt":"2016-03-22T22:15:20","slug":"still-using-kerberos-authentication-now-you-have-a-reason-to-stop-it-does-not-keep-you-safe","status":"publish","type":"post","link":"https:\/\/www.cloudinsidr.com\/content\/still-using-kerberos-authentication-now-you-have-a-reason-to-stop-it-does-not-keep-you-safe\/","title":{"rendered":"Still using Kerberos Authentication? Now You Have a Reason to Stop: It Does NOT Keep Your Business Safe"},"content":{"rendered":"<p>Kerberos, an ancient network authentication protocol from the 1980s that is commonly used to this day, can get you into some serious trouble.<\/p>\n<p>The\u00a0Kerberos setup used by your organization may not be all it&#8217;s cracked up to be.<\/p>\n<p><!--more--><\/p>\n<p>Some myths run deep in the IT industry. It turns out, such is the case with Kerberos.\u00a0The truth about security implications of using vanilla Kerberos is buried deep within its\u00a0documentation.<\/p>\n<p>Never mind,\u00a0the esteemed\u00a0<a href=\"http:\/\/web.mit.edu\/kerberos\/\" target=\"_blank\">MIT<\/a> (Massachusetts Institute of Technology) keeps pushing\u00a0new releases of their implementation of Kerberos.\u00a0Their latest update was published\u00a0less than\u00a0two weeks\u00a0ago. Their\u00a0official\u00a0<a href=\"http:\/\/web.mit.edu\/kerberos\/\" target=\"_blank\">project\u00a0website<\/a>\u00a0treats you to\u00a0this statement:<\/p>\n<blockquote><p><em><b>The Internet is an insecure place.<\/b> Many of the protocols used in the Internet do not provide any security. Tools to &#8220;sniff&#8221; passwords off of the network are in common use by malicious hackers. (&#8230;)<\/em><\/p><\/blockquote>\n<p>As if they were trying to say &#8220;You are safe when using\u00a0Kerberos&#8221;. But is that really so?<\/p>\n<p>Not likely, at least not without further ado.<\/p>\n<p><a href=\"https:\/\/twitter.com\/int10h\" rel=\"attachment wp-att-1046\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1046 alignleft\" src=\"https:\/\/www.cloudinsidr.com\/content\/wp-content\/uploads\/2016\/03\/Brian-281x300.png\" alt=\"Brian H2O's Twitter profile\" width=\"281\" height=\"300\" srcset=\"https:\/\/www.cloudinsidr.com\/content\/wp-content\/uploads\/2016\/03\/Brian-281x300.png 281w, https:\/\/www.cloudinsidr.com\/content\/wp-content\/uploads\/2016\/03\/Brian.png 478w\" sizes=\"(max-width: 281px) 100vw, 281px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/twitter.com\/int10h\" target=\"_blank\">Brian H\u2082O\u2019s (@int10h)<\/a> had this to say via Twitter after diving into Kerberos:<\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p dir=\"ltr\" lang=\"en\"><a href=\"https:\/\/twitter.com\/CloudInsidr\">@CloudInsidr<\/a> yeah, because krb by itself only auths the client\/server at the moment of handshake. there is not tunnel after, like ssl\/ssh<\/p>\n<p>\u2014 Brian H\u2082O\u2019s (@int10h) <a href=\"https:\/\/www.cloudinsidr.com\/content\/wp-content\/uploads\/2016\/03\/kerberos_handshake.png\" target=\"_blank\">March 7, 2016<\/a><\/p><\/blockquote>\n<p>Wow. Talk about surprises.<\/p>\n<p>This looks like a serious case of IT\u00a0&#8220;malpractice&#8221; and disinformation on the part of organizations advocating the use of Kerberos.<\/p>\n<p>What if&#8230; what if this architectural flaw is somehow\u00a0not an oversight, not a bug\u00a0but\u00a0a so-called &#8220;feature&#8221;?<\/p>\n<blockquote class=\"twitter-tweet\" data-conversation=\"none\" data-lang=\"en\">\n<p dir=\"ltr\" lang=\"en\"><a href=\"https:\/\/twitter.com\/CloudInsidr\">@CloudInsidr<\/a> not really. it wasn&#8217;t designed for tunneling. you can still do it, though. ssh w\/ krb auth via gssapi does this.<\/p>\n<p>\u2014 Brian H\u2082O\u2019s (@int10h) <a href=\"https:\/\/www.cloudinsidr.com\/content\/wp-content\/uploads\/2016\/03\/Kerberos_tunneling.png\" target=\"_blank\">March 7, 2016<\/a><\/p><\/blockquote>\n<p>Good to know. Is it worth the effort, then? (You decide.)<\/p>\n<p>Thanks to\u00a0<a class=\"ProfileNameTruncated-link u-textInheritColor js-nav js-action-profile-name\" href=\"https:\/\/twitter.com\/int10h\" data-aria-label-part=\"\" data-send-impression-cookie=\"true\">Brian H\u2082O\u2019s<\/a>\u00a0(<a href=\"https:\/\/twitter.com\/int10h\" data-user-id=\"189342770\"><span data-aria-label-part=\"\">@int10h<\/span><\/a>) for this enlightening exchange!<\/p>\n<p><script src=\"\/\/platform.twitter.com\/widgets.js\" async=\"\" charset=\"utf-8\"><\/script><\/p>\n<p><script src=\"\/\/platform.twitter.com\/widgets.js\" async=\"\" charset=\"utf-8\"><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kerberos, an ancient network authentication protocol from the 1980s that is commonly used to this day, can get you into some serious trouble. The\u00a0Kerberos setup used by your organization may not be all it&#8217;s cracked up to be.<\/p>\n","protected":false},"author":101011,"featured_media":1048,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[16,131,17,33,115],"tags":[133,19],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v14.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Still using Kerberos Authentication? Now You Have a Reason to Stop: It Does NOT Keep Your Business Safe - CloudInsidr<\/title>\n<meta name=\"robots\" content=\"index, follow\" \/>\n<meta name=\"googlebot\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta name=\"bingbot\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cloudinsidr.com\/content\/still-using-kerberos-authentication-now-you-have-a-reason-to-stop-it-does-not-keep-you-safe\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Still using Kerberos Authentication? Now You Have a Reason to Stop: It Does NOT Keep Your Business Safe - CloudInsidr\" \/>\n<meta property=\"og:description\" content=\"Kerberos, an ancient network authentication protocol from the 1980s that is commonly used to this day, can get you into some serious trouble. The\u00a0Kerberos setup used by your organization may not be all it&#8217;s cracked up to be.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cloudinsidr.com\/content\/still-using-kerberos-authentication-now-you-have-a-reason-to-stop-it-does-not-keep-you-safe\/\" \/>\n<meta property=\"og:site_name\" content=\"CloudInsidr\" \/>\n<meta property=\"article:published_time\" content=\"2016-03-08T00:33:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-03-22T22:15:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cloudinsidr.com\/content\/wp-content\/uploads\/2016\/03\/Kerberos_logo.png\" \/>\n\t<meta property=\"og:image:width\" content=\"820\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n<meta name=\"twitter:card\" content=\"summary\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cloudinsidr.com\/content\/#website\",\"url\":\"https:\/\/www.cloudinsidr.com\/content\/\",\"name\":\"CloudInsidr\",\"description\":\"Cyber security, infotech\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/www.cloudinsidr.com\/content\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.cloudinsidr.com\/content\/still-using-kerberos-authentication-now-you-have-a-reason-to-stop-it-does-not-keep-you-safe\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.cloudinsidr.com\/content\/wp-content\/uploads\/2016\/03\/Kerberos_logo.png\",\"width\":820,\"height\":300,\"caption\":\"Kerberos\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cloudinsidr.com\/content\/still-using-kerberos-authentication-now-you-have-a-reason-to-stop-it-does-not-keep-you-safe\/#webpage\",\"url\":\"https:\/\/www.cloudinsidr.com\/content\/still-using-kerberos-authentication-now-you-have-a-reason-to-stop-it-does-not-keep-you-safe\/\",\"name\":\"Still using Kerberos Authentication? Now You Have a Reason to Stop: It Does NOT Keep Your Business Safe - CloudInsidr\",\"isPartOf\":{\"@id\":\"https:\/\/www.cloudinsidr.com\/content\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cloudinsidr.com\/content\/still-using-kerberos-authentication-now-you-have-a-reason-to-stop-it-does-not-keep-you-safe\/#primaryimage\"},\"datePublished\":\"2016-03-08T00:33:09+00:00\",\"dateModified\":\"2016-03-22T22:15:20+00:00\",\"author\":{\"@id\":\"https:\/\/www.cloudinsidr.com\/content\/#\/schema\/person\/21ce63bea726ea64da1beed97e63ba84\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cloudinsidr.com\/content\/still-using-kerberos-authentication-now-you-have-a-reason-to-stop-it-does-not-keep-you-safe\/\"]}]},{\"@type\":[\"Person\"],\"@id\":\"https:\/\/www.cloudinsidr.com\/content\/#\/schema\/person\/21ce63bea726ea64da1beed97e63ba84\",\"name\":\"Anna E Kobylinska\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.cloudinsidr.com\/content\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7a3e9bd152f9d5cd41bf2b92df649857?s=96&d=mm&r=g\",\"caption\":\"Anna E Kobylinska\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/www.cloudinsidr.com\/content\/wp-json\/wp\/v2\/posts\/1043"}],"collection":[{"href":"https:\/\/www.cloudinsidr.com\/content\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cloudinsidr.com\/content\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudinsidr.com\/content\/wp-json\/wp\/v2\/users\/101011"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudinsidr.com\/content\/wp-json\/wp\/v2\/comments?post=1043"}],"version-history":[{"count":10,"href":"https:\/\/www.cloudinsidr.com\/content\/wp-json\/wp\/v2\/posts\/1043\/revisions"}],"predecessor-version":[{"id":1059,"href":"https:\/\/www.cloudinsidr.com\/content\/wp-json\/wp\/v2\/posts\/1043\/revisions\/1059"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cloudinsidr.com\/content\/wp-json\/wp\/v2\/media\/1048"}],"wp:attachment":[{"href":"https:\/\/www.cloudinsidr.com\/content\/wp-json\/wp\/v2\/media?parent=1043"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cloudinsidr.com\/content\/wp-json\/wp\/v2\/categories?post=1043"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cloudinsidr.com\/content\/wp-json\/wp\/v2\/tags?post=1043"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}