[4466] in Kerberos

home help back first fref pref prev next nref lref last post

Re: Help After Install

daemon@ATHENA.MIT.EDU (Anthony J. Lill)
Mon Jan 9 23:55:00 1995

To: gord@enci.ucalgary.ca (Gordon Matzigkeit)
Cc: kerberos@MIT.EDU
In-Reply-To: Your message of "Mon, 19 Dec 1994 00:32:35 GMT."
             <GORD.94Dec18173235@enci.ucalgary.ca> 
Reply-To: Tony.Lill@ajlc.waterloo.on.ca
Date: Mon, 09 Jan 1995 23:04:07 -0500
From: "Anthony J. Lill" <ajlill@ajlc.waterloo.on.ca>

Never ask a question before Christmas...

>>>>> "Gordon" == Gordon Matzigkeit <gord@enci.ucalgary.ca> writes:

    Gordon> O.K.  I think this is where my lack of knowledge shines
    Gordon> through.  Am I correct in thinking that Kerberos
    Gordon> completely replaces the NIS passwd maps?  This would be
    Gordon> even nicer.

No, Kerberos just handles the password part of the passwd file, you
still need NIS or something for the other 6 fields.

    Gordon> Somebody pointed out to me in private e-mail that there
    Gordon> are 6 netadmins at MIT who manage 1300 machines.  If
    Gordon> Kerberos includes a passwd database replacement, would
    Gordon> this be managed by keeping private console passwords for
    Gordon> each machine, but using kerberized rcommands for
    Gordon> day-to-day administration?

I don't know what tools Hesiod and Moria provide (perhaps someone who
knows will post a short summary), but using Kerberos+NIS, I'd do that.

    Tony>    Of course, without knowing just what you're trying to
    Tony> accomplish, it's very hard to say just how you should
    Tony> proceed. Security can mean anything from your farourite
    Tony> blankie to a minefield.

    Gordon> Yeah... I guess I should be more specific:

    Gordon> We have a couple of Sun machines which are under our
    Gordon> direct administration.  Currently, and unfortunately, they
    Gordon> have to trust eachother quite a bit.  In the same
    Gordon> ethernetwork, there are several office and lab PCs, which
    Gordon> we have little control over.  Right now, we don't have a
    Gordon> serious problem, but as the network grows, it may become
    Gordon> more malicious.

    Gordon> Our UNIX users belong to two overlapping groups:

    Gordon> casual - just need access to cheap UNIX servers and
    Gordon> workstations for mail, ftp, etc.

    Gordon> high-performance - need our more expensive UNIX servers to
    Gordon> do heavy number-crunching.

    Gordon> We want to make this setup as secure as possible.  With
    Gordon> standard UNIX administration, it is a nightmare.  We are
    Gordon> currently using host-based access control on EVERY
    Gordon> workstation and server.  s/key is fun for a while, but it
    Gordon> gets to be a pain when you want root on 4 or 5
    Gordon> workstations, and its security is fairly dependant on the
    Gordon> fact that we never use a time-shared system to compute our
    Gordon> passwords.  Yeargh!

    Gordon> So, we are in the process of planning a major
    Gordon> reorganization to allow easy and manageable network
    Gordon> growth.

    Gordon> These are our concerns:

    Gordon> 1) Be as transparent as possible.  Right now, our users
    Gordon> have more pull with our bosses than we do.

    Gordon> 2) Have simple, centralized host-by-host access control.
    Gordon> This is necessary so that we can stop casual users from
    Gordon> using our hiperf machines, and stop anybody except sysadms
    Gordon> from using Xterms from the network, etc.

I don't think Kerberos will give you this, at least a quick scan of
telnet didn't show any sort of access control other than what normal
telnet does. It will open an encrypted channel, and you can have it
bypass the login program and rely on kerberos only, if desired. Of
course, since you are compiling the source anyway, you can add what
you want. 

The Xterms are another problem, and I think you're completely out of
luck there.

    Gordon> 3) Have as much authentication as possible.  We can't do
    Gordon> this at all right now.  Ideally, all our UNIX machines
    Gordon> would be kerberized, *but*, what about people who login
    Gordon> from their home PCs over the network?  They have to
    Gordon> traverse untrusted nets.

Two that I know of are FTP Inc's TCP product has Kerberos V4 built
in. CyberSAFE Corporation markets a Version 5 Windows Client with
WinSock API compatibility. Kerberized r-commands and telnet, single
copy price $95. There may be others.

    Gordon> 4) Allow rdumps, NFS between our UNIX machines that the
    Gordon> PCs will not be able to listen in on.  I think subnetting
    Gordon> our PCs will partially solve this.  Ideally, it would be
    Gordon> encrypted so that it doesn't matter what nasty people
    Gordon> sniffed our ethernet.  I think Sun secure RPC can be used
    Gordon> for the NFS problem, but I don't know about rdumps.  1
    Gordon> tape drive per host is not feasible.  Maybe other backup
    Gordon> software (we're using the perl scripts from
    Gordon> cis.ohio-state.edu) would support that.

Sun has a kerberized RPC, so that may be another option for NFS, but
I don't know what it's availablility is. The rdump software is
avaialble on the net, so you could kerberize that yourself, or backup
via NFS.

    Gordon> So, that's it in a nutshell.  All us netadmin people are
    Gordon> trying to do is prevent people from abusing privileged
    Gordon> resources.

    Gordon> Thanks again for everybody's comments thus far.

You're welcome.

--
Tony Lill,                         Tony.Lill@AJLC.Waterloo.ON.CA
President, A. J. Lill Consultants                 (519) 241 2461
539 Grand Valley Dr., Cambridge, Ont.    fax/data (519) 650 3571

"Welcome to All Things UNIX, where if it's not UNIX, it's CRAP!"

home help back first fref pref prev next nref lref last post