[253] in Kerberos

home help back first fref pref prev next nref lref last post

Re: an_to_ln

daemon@TELECOM.MIT.EDU (raeburn@ATHENA.MIT.EDU)
Fri Nov 13 22:34:59 1987

From: raeburn@ATHENA.MIT.EDU
To: srz@MELANGE.LCS.MIT.EDU
Cc: kerberos@ATHENA.MIT.EDU
In-Reply-To: Stan Zanarotti's message of Fri, 13 Nov 87 16:00:59 EST <8711132100.AA06250@melange.LCS.MIT.EDU>


It sounds good, but the krb_alias program, as implemented (if I
remember it right), would permit denial of service of a sort.
Consider this scenario:

	I log in to Charon.

	I run "krb_alias" with the appropriate arguments to map
	"jon@ATHENA.MIT.EDU" to "raeburn".

	Jon can no longer log in to his own account on Charon.

(Guess who I was just discussing this with?)

You would probably have to present tickets for <aname> to be mapped,
as well as tickets for the target <lname> (or someone who can get mapped
to it) in order to establish the mapping.  A simple implementation
could ask for the password of the <aname> while logged in as <lname>
(which assumes that authentication and authorization have already been
established).

home help back first fref pref prev next nref lref last post