[1579] in Kerberos_V5_Development

home help back first fref pref prev next nref lref last post

Re: ftpd should allow protection to be required

daemon@ATHENA.MIT.EDU (Barry Jaspan)
Wed Aug 14 23:05:18 1996

Date: Wed, 14 Aug 96 22:59:50 -0400
From: "Barry Jaspan" <bjaspan@MIT.EDU>
To: hartmans@MIT.EDU
Cc: krbdev@MIT.EDU
In-Reply-To: <tslu3u5lduh.fsf@tertius.mit.edu> (message from Sam Hartman on 14
	Aug 1996 19:56:22 -0400)


   I agree the option should be provided to require encryption; I'm not
   convinced we want to support the behavior of the Athena hack.

Right.  We agree.

	   Am I correct in my understanding that the command connection
   starts with integrity turned on?

I found no mention of that in the man page, but it would certainly be
a good thing.  I guess traffic analysis of ftp commands isn't
particularly important, although on the other hand encrypting them
would be cheap.

	   Why would it be wrong for ftp to accept an automated transfer
   to lower security if the command connection had integrity?

Generally, because allowing a remote server to reduce the security of
connection silently and (perhaps) against the request of the user just
seems like a bad idea.  Perhaps an attacker compromised the ftpd and
arranged for it always to reduce from private to safe; then the
attacker could watch the ftp traffic without actually having to be
logged in to the server and without requiring the server to off-load
data to the attacker (ie: detection might be harder).  Unlikely,
perhaps, and if the attacker compromised ftpd probably he got the
service key too so it is all irrelevant.  But I don't see a good
reason to allow it either.

The easy solution is to make encryption requirable and, if required
and not used, have ftpd just refuse the command.

Barry


home help back first fref pref prev next nref lref last post