[19173] in Kerberos

home help back first fref pref prev next nref lref last post

Re: Apps aquiring tickets (was Re: gssapi/openssh)

daemon@ATHENA.MIT.EDU (James F.Hranicky)
Fri May 2 11:34:22 2003

Date: Fri, 2 May 2003 11:33:30 -0400
From: "James F.Hranicky" <jfh@cise.ufl.edu>
To: kerberos@mit.edu
Message-Id: <20030502113330.6c08c5f2.jfh@cise.ufl.edu>
In-Reply-To: <3EB28936.8C5B209C@anl.gov>
Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Errors-To: kerberos-bounces@mit.edu

On Fri, 02 May 2003 10:05:26 -0500
"Douglas E. Engert" <deengert@anl.gov> wrote:

> You are asking for trouble if any application can ask the user to
> enter their password at any time. They will, and will try all of
> their passwords if they have too. Better to train them to entry it 
> only specific times, like login, and be suspicious if any application
> asks for their password.    

Even a standard, well documented one?

Users of Kerberized apps have to "do something" when the TGT expires, why
not let them be prompted?

This sort of social engineering can happen whether or not "kinitd" exists,
so why not train them to *only* input the password when the kinitd pops
up the prompt?

I would surmise that the likelihood of someone popping up a trojan prompt
is roughly equivalent to the likelihood of someone replacing the kinit
binary itself.

> Kerberos does this.

Well, it can do this, or apps can set their own with the KRB5CCNAME 
env variable. I submit with 2), you wouldn't need to do this nearly
as often.

> >         2) the ticket cache could contain TGTs for multiple realms

Jim
________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

home help back first fref pref prev next nref lref last post