[4329] in Kerberos

home help back first fref pref prev next nref lref last post

Re: request for commentary on krb IV server mod

daemon@ATHENA.MIT.EDU (Phi H Truong)
Tue Dec 13 10:13:47 1994

To: kerberos@MIT.EDU
Date: 13 Dec 1994 14:49:44 GMT
From: orion@iastate.edu (Phi H Truong)
Reply-To: orion@iastate.edu (Phi H Truong)

In article <199412120918.EAA13173@prez.mit.edu>,
Daniel G. Pouzzner <douzzer@prez.mit.edu> wrote:
>
>Hi all.
>
>I've just modified our kerberos servers to disable the inet_addr
>matching performed by krb_rd_req(). This allows us to have tickets
>(and AFS tokens) automatically set up when we telnet. I am of the
>opinion that the inet_addr checking offers no real additional
>security. A possible half-way in this area is to implement an
>"outstanding tgt" table in the kserver: tgt's and the hosts from which
>they may be used are recorded, and use of a tgt by a secondary host
>can only be endorsed by a request initiated from a host already in the
>list. Needless to say, the entire family of ticket files associated
>with the tgt simultaneously expire.
>

I am somewhat confused to what you were trying to accomplish.  Are you
trying to do ticket forwarding or just to get telnet to work with
kerberos/AFS?  For the former, I have some ideas but haven't tested.  As
for the later, it would seem a bit drastic to change kerberos code just
to make telnet to work properly.

I can see ticket forwarding as a plus for doing rsh or rcp but not for
other things like telnet or rlogin.  
-- 
_____
Phi H. Truong              "Hmmmmmmmm....... "      
orion@iastate.edu          ISU Computation Center
Systems Analyst            237 Durham Center         ph: (515) 294 -1420

home help back first fref pref prev next nref lref last post