[1671] in Kerberos

home help back first fref pref prev next nref lref last post

MIT login.c

daemon@ATHENA.MIT.EDU (Dec-Glenn NoI Machin)
Mon Dec 9 20:25:42 1991

Date: Mon, 9 Dec 91 17:48:35 MST
From: gmachin@somnet.sandia.gov (Dec-Glenn NoI Machin)
To: kerberos@Athena.MIT.EDU


What was the rationale for requiring kerberized remote login programs to 
use a modified login program, rather than using the -r option available
on most systems?  With each vendor adding it's own bells and whistles to 
login, the source for the  login program is necessary so that 
you perform the required checks that each vendor sees necessary. Since
rlogind (klogind) does authentication, the MIT login program is simply
doing authorzation checks (kuserok,passwd entry, etc).  If klogind did the 
authorization checks, along with some possible local username and remote 
username shortening, klogind could call login -r and pass down local username,
remote username, and terminal type.   The problem as I see it is that the
.rhosts file is still necessary. However from a security point of view
if all services that use .rhosts require kerberos authentication then
the .rhosts simply becomes an inconvience, not a security hole.

Are there any other network services other that rlogind, rshd that use 
.rhosts for authorization?


home help back first fref pref prev next nref lref last post