[38031] in Kerberos

home help back first fref pref prev next nref lref last post

Re: Is a keytab file encrypted?

daemon@ATHENA.MIT.EDU (Russ Allbery)
Fri Jul 21 15:42:56 2017

From: Russ Allbery <eagle@eyrie.org>
To: Charles Hedrick <hedrick@rutgers.edu>
In-Reply-To: <A6886DC9-B31F-466E-AAFD-C6C63515027A@rutgers.edu> (Charles
	Hedrick's message of "Fri, 21 Jul 2017 15:13:54 +0000")
Date: Fri, 21 Jul 2017 12:42:38 -0700
Message-ID: <871sp9lgpd.fsf@hope.eyrie.org>
MIME-Version: 1.0
Cc: "kerberos@mit.edu" <kerberos@mit.edu>
Content-Type: text/plain; charset="utf-8"
Errors-To: kerberos-bounces@mit.edu
Content-Transfer-Encoding: 8bit

Charles Hedrick <hedrick@rutgers.edu> writes:

> The argument makes sense.

> However I am disturbed by the fact that a keytab can be used
> anywhere. If someone manages to become root on one machine, I’d like
> them not to be able to do things on other machines. I’m in an
> environment where we have systems administered by users, and unattended
> public workstations.

> That makes me unwilling to tell users to create key tables for cron
> jobs.

Yeah, if you're worried about portable keys, that's when you probably want
to do something with a system TPM.  If you go down that path, I'd probably
try to figure out some way to do PKINIT using a TLS certificate stored in
the TPM.  I'm not aware of anyone who has already done that work, but it
would be a pretty interesting project.

-- 
Russ Allbery (eagle@eyrie.org)              <http://www.eyrie.org/~eagle/>

________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos


home help back first fref pref prev next nref lref last post