[718] in Kerberos
authentication in news reading
daemon@TELECOM.MIT.EDU (Jerome H Saltzer)
Wed May 10 07:06:47 1989
From: Jerome H Saltzer <jhs%computer-lab.cambridge.ac.uk@NSFNET-RELAY.AC.UK>
To: jordan@cs.columbia.edu
Cc: kerberos@ATHENA.MIT.EDU, nntp-managers@UCBVAX.BERKELEY.EDU
In-Reply-To: Jordan Hayes's message of Tue, 9 May 89 09:29:32 EDT <8905091329.AA11693@cs.columbia.edu>
> I've been thinking about this for a while, and it seems to me that a
> Kerberized version of some new protocol (perhaps implemented in RPC
> rather than an SMTP-like interface, so that a dummy server could be
> built that would link directly into the client code to provide "local"
> newsreading without changing anything but a Makefile) at first sounds
> like the way to go, but administering a large list of who gets
> permission to do what is likely to be a major headache.
> For instance, you have class groups (cs160, for example) at Berkeley.
> There would be a list of who gets to read it, who gets to post to it,
> etc. It has to be kept on the kerberos server and needs to be
> updatable rather easily by a large number of people (TA's, professors,
> etc.).
The mechanism you are looking for is an authorization system, probably
in the form of a set of nested access control lists. But it probably
should NOT be kept on the Kerberos server.
When we worked out the design of Kerberos we debated whether or not to
include an authorization system, and (after a fair amount of argument)
decided not to. There are two fundamental reasons:
1. The dynamics of authorization cover a much greater range than
those of authentication--there can be any number of access-control
lists, they can be of arbitrary and unpredictable size, and they
need to be be administered by a wide range of people. Compared with
the small, slowly-changing, predictably-sized, and
uniformly-administered database required for authentication, many
of the design considerations were different, so it appeared more
appropriate to separate the services.
2. There are many possible models for controlling authorization, and
different network services may require (or prefer) different
models. Rather than trying to choose the one best model, or try
to implement a general system that caters to all possible models,
it seemed better to leave the model up to the service.
The way I would approach the business of controlling authorization for
news would be to think through what control features are wanted, and
then build up a news-specific mechanism, based on the assumption that
it can rely on clients to present Kerberos-derived principal
identifiers that are certifiably correct.
> Does anyone have any experience with allowing an update facility to
> large numbers of "somewhat trustworthy" people on large numbers of
> access lists?
Not exactly, but moderately close. There is a mail list, group list,
and access list update mechanism in the Athena Service Management
System (Moira). The lists have access control lists of their own and
there is a Kerberos-mediated network protocol for remote update of
lists. One could probably adapt this system to drive an access
control system for the news system.
Jerry Saltzer