Skip to content

Conversation

TheBestTvarynka
Copy link
Collaborator

@TheBestTvarynka TheBestTvarynka commented Oct 10, 2025

Hi,
I fixed the scard-based auth AS exchange in our Kerberos implementation. The problem (surprisingly) was in the default DH credentials. The leading zero is the cause of the invalid public key generation:

image (1)

Why did we have the leading zero?

Because around 3 years ago (#61), it was written as it is. It worked well with the previous bigint dependency, but not with the crypto-bigint.

Why did we hardcode them?

I think they should be randomly generated. But it is not a major security issue because the private key is still randomly generated. I propose to fix it in the future and replace hardcoded public key parameters with their random generation on each logon

cc @thenextman

@TheBestTvarynka TheBestTvarynka self-assigned this Oct 10, 2025
@TheBestTvarynka TheBestTvarynka marked this pull request as ready for review October 10, 2025 11:13
Copy link
Member

@CBenoit CBenoit left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM!

@CBenoit CBenoit enabled auto-merge (squash) October 10, 2025 13:48
@CBenoit
Copy link
Member

CBenoit commented Oct 10, 2025

You need to update the reference to latest picky version (rc.19) in order to fix the CI

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Development

Successfully merging this pull request may close these issues.

2 participants