[2289] in Kerberos_V5_Development

home help back first fref pref prev next nref lref last post

Re: ["Tony Mione" ] DNS lookups for Host Realm information

daemon@ATHENA.MIT.EDU (Ezra Peisach)
Fri Mar 7 13:54:24 1997

To: Sam Hartman <hartmans@MIT.EDU>
Cc: krbdev@MIT.EDU
In-Reply-To: Your message of "Fri, 07 Mar 1997 11:42:04 EST."
             <199703071642.LAA14942@odin.appliedtheory.com> 
Date: Fri, 07 Mar 1997 13:52:29 EST
From: Ezra Peisach <epeisach@MIT.EDU>


I believe, although I cannot prove it, that if I can spoof a DNS packet
and fool a host into believing it is a host in my locally administrated
kerberos realm that I could probably break in by fooling login.krb5 to
talking to me for the initial TGT. If memory serves correctly, this
would be sufficient to break into a machine (assuming the machine in
question does not have a keytab). 

So, some information in a configuration file is critical, but how much?
As mentioned above, I think realm info is. How about the name of the
servers - is this really critical, or can DNS provide it in an adequate
way?

Just some food for thight...


	Ezra








home help back first fref pref prev next nref lref last post