[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Cryptosplit 2.0




>If I remember coorectly it's KerberosV uses an MD5 hash of /dev/mem.

I'm pretty familiar with the most recent iteration of Kerberos V  
(pre-release beta 3).  There is no mention of /dev/mem in any of the  
Kerberos V source code files.

As best as I can tell,  all DES keys and random numbers used by Kerberos  
are ultimately derived from pass-phrases.

The random DES keys produced by the Kerberos administration utilities are  
derived from the KDC master key and some other info (not /dev/mem).  The  
KDC master key is derived from a pass-phrase.

All random numbers used inside the Kerberos runtime library are derived  
from the user's or server's secret DES key.  A user's secret key is  
derived from the user's pass-phase.  A server's secret key is derived from  
a pass-phrase or generated automagically by the Kerberos administration  
utilities mention above.

(all this is assuming you are using the DES encryption option)

[email protected]