[6830] in Kerberos

home help back first fref pref prev next nref lref last post

Re: kerberos or NIS for password validation

daemon@ATHENA.MIT.EDU (Barry Jaspan)
Wed Mar 6 11:12:37 1996

Date: Wed, 6 Mar 96 10:56:25 EST
From: Barry Jaspan <bjaspan@bbnplanet.com>
To: Bryce <SBD9924@alpha.cc.oberlin.edu>
Cc: kerberos@MIT.EDU
In-Reply-To: [6818]


   I believe that by changing the kerberos login program, ksu, xdm, xlock,
   etc, I could completely replace the NIS passwords with kerberos passwords,
   and put a * in all the NIS password fields.  Wouldn't this be an 
   improvement over our current situation?

It would certainly be an *improvement*, yes.  If nothing else, there
are probably fewer people in the world who know how to fake a response
from the KDC than a response from NIS.  This is theoretically
worthless, but in practice is does raise the bar a little bit.

Particularly if you require pre-authentication, it will be harder for
an attacker to acquire a complete password list to perform a
dictionary attack against.  An attacker will still be able to perform
a dictionary attack against any single user for which he can sniff the
Kerberos packets off the network, but again that is a higher bar.

The particular threat you mentioned, that an attacker can forge a
response from the KDC, only allows the attacker to log in to a local
workstation as a user.  It does NOT give the attacker valid Kerberos
tickets.  This means, for example, that the attacker would not be able
to log in to a Kerberos rlogind server with the forged TGT.  Only the
local host is compromised.  And, as I stated in the FAQ, this attack
can be preveted by placing a keytab on the client host (although this
comes with its own set of tradeoffs).

Barry


home help back first fref pref prev next nref lref last post