[991] in Kerberos_V5_Development

home help back first fref pref prev next nref lref last post

Re: removing user-user authentication from rcp client

daemon@ATHENA.MIT.EDU (Sam Hartman)
Fri Feb 2 16:00:04 1996

To: "Donald T. Davis" <don@cam.ov.com>
Cc: Sam Hartman <hartmans@MIT.EDU>, krbdev@MIT.EDU
From: hartmans@MIT.EDU (Sam Hartman)
Date: 02 Feb 1996 15:59:41 -0500
In-Reply-To: "Donald T. Davis"'s message of Thu, 01 Feb 1996 21:25:48 -0500

>>>>> "Donald" == Donald T Davis <don@cam.ov.com> writes:

    Donald> sam, i was the coauthor (with ralph swick) of v5's
    Donald> user-to-user protocol, which i intended in part to support
    Donald> client-to-client rcp (as well as secure x service).  so,
    Donald> i'm perplexed by your subject line; your message seems not
    Donald> to refer to the "two tgt" protocol we wrote. i'm hoping
    Donald> that your message isn't about removing "two tgt" support
    Donald> from rcp. please, can you clarify my confusion?

	Yes; I'm proposing to remove the two TGT protocol from the rcp
client, maintaining support in the server for backward compatability.
I agree  that this protocol is a reasonable solution for X but think
that using the native encryption support in the krshd  is much
preferable to requiring the TGT on both sides of the rcp.  Here  are
the reasons I think this is preferable:

1)  The Athena operations people I talked to indicated that requiring
two TGTs was unacceptable.  They want to be able to avoid having any
unnecessary root tickets, and want to be able to copy a file from a
more trusted machine to a less trusted machine without getting
credentials on the less trusted machine.  Athena and the
Re-engineering team are our two primary customers; it's sometimes a
good idea to list to the requirements of your customers.

2)  I fail to see any situations where the two-TGT protocol can be
applied that the rsh encryption protocol cannot be applied to.  (Well,
you construct things to work for machines not running a kshd, but
having an encrypted connection to  something that will trust network
addresses for authentication is less than ideal, and the current
implementation will not fall back to rcmd if kcmd fails anyway.)

	I have talked to several memebers of the Kerberos team here,
and no one has been able to figure out why a two-TGT protocol is
preferable for rcp; it's possible we're missing something.  

--Sam

    Donald> 				-don davis, boston
    Donald> ----------------------------------------------------------------------
    Donald> you wrote: There is no good reason for rcp not to use rsh
    Donald> -x and there are several good reasons for it to do so.  In
    Donald> particular, the current implementation requires the user
    Donald> to have tickets on both sides of the connection. I will
    Donald> investigate using a protocol compatible with rsh -x, and
    Donald> if it looks fairly easy, implement the change.  I will
    Donald> retain server support for the old method at the current
    Donald> time, although I think we should consider it depricated.

    Donald> 	Also, since I haven't heard any objections to removing
    Donald> the TGS enctypes check on the cccache code, I wil go ahead
    Donald> and do so.  This means that if a specific enctype is not
    Donald> request, any ticket of any enctype found in the ccache
    Donald> will satisfy the request.

    Donald> --Sam


home help back first fref pref prev next nref lref last post