[534] in Kerberos

home help back first fref pref prev next nref lref last post

Re: A collection of suggested changes to Kerberos.

daemon@TELECOM.MIT.EDU (Bill Sommerfeld)
Mon Nov 28 13:32:25 1988

From: Bill Sommerfeld <wesommer@ATHENA.MIT.EDU>
To: kfall@OKEEFFE.BERKELEY.EDU
Cc: Bill Sommerfeld <wesommer@ATHENA.MIT.EDU>, kerberos@ATHENA.MIT.EDU
In-Reply-To: Kevin Fall's message of Mon, 28 Nov 88 01:59:54 PST,

Thanks for the comments; I'll answer a few.

   It was pointed out by someone here that an appropriate place
   to require re-authentication would be from 'screensaver'
   type programs, which lock up your terminal after
   some predetermined idle period.  When you provide your
   password on your return, this will re-establish your tickets.

"Useful but not sufficient".  This doesn't work for long term,
unattended "batch" jobs.

   I am somewhat concerned about the use of 'infinite' ticket
   lifetimes.  It seems to me self-defeating to even provide
   for such a facility.  If it is truly determined to be necessary,
   however, it would be nice to have an option to ignore
   infinite tickets (e.g. compile-time option).

Noted; I would argue that there should be a per-site or per-realm
configurable option for the maximum lifetime.  For flexibility, it
should probably be a run-time configurable option for the KDC.

   I agree with the long term suggestion that explicit issue
   and expiration timespamps are the right way to go.
   Are there really any convincing arguments to use the UNIX
   time encoding over the "Internet Standard Time" convention?

Not really, since both formats are a 32 bit count of seconds since
some start time; in one case, 1/1/1900, and in the other 1/1/1970.

   This does seem the obvious conclusion to jump to, but as mentioned
   below, there is already a problem with internet addresses restricting
   Kerberos to a particular address family (not to mention the
   multi-homed host problem).  I think it is probably a mistake
   to latch on to the internet naming conventions merely for
   convenience.  There are many installations with multi-address
   family hosts (here we have Datakit, NS, and Internet).

Note the use of the word "conventions".  Nothing in the protocol or
implementation should prohibit or impede the use of other forms of
realm name, but it was felt that some kind of naming convention
_should_ exist, just for consistancy among connected Internet sites.

   Are these [protocol changes] listed publicly?

I think you misunderstood the message; the list which follows (1.1 ..
1.12) is the list of suggested protocol changes.

   > 
   > 1.9) merging principal and instance fields into one field.
   > 
   > Under this proposal, the new names would look like "name@realm"; for
   > server names, the "name" part would be "service.machinename" or
   > whatever convention the service decided on.
   > 

   Is it really unreasonable to suggest the abolition of instances?
   Once you've received your ticket granting ticket, it is somewhat
   natural to expect you will be issued tickets for whatever services
   you request in your realm (and others if you're inter-realm
   authenticated).  Services should be thought of more like
   the such-and-such service in the "foo" realm, rather than
   the such-and-such service instance running on machine 'bar' in
   realm "foo".

   If you create some service which you think needs
   to have separate tickets for each different instance, you are
   probably not really talking about the *same* service anyway.

We seem not to agree on terminology here.

By "service", do you mean "rlogin" or do you mean "rlogin into host
A"?

I definitely want separate services for each different host; if host A
is compromised, I should not be able to use that information to
compromise host B.

There can be mutually suspicious system administrators within a realm,
as long as they all trust the system administrator(s) for the machines
running the KDC.

	   Reliable, replicated, secure databases == research

Maybe this was the case a few years ago, and it may still be the case
for "general purpose" databases, but at the level of replicated data
needed for Kerberos, I am told that it is currently more like
"development".  For example, there's Apollo's user accounts registry
system (which has shipped to customers).  It appears to be reliable
(at least from my experience), is replicated, and uses a shared-key
authentication scheme for security.  It is a master-slave system as
opposed to a more symmetric system; maybe this doesn't fit your
definition of "distributed database".

Mike Kazar has also been working on a system called "ubik"; I don't
know about it in detail.

				- Bill

home help back first fref pref prev next nref lref last post