[256] in Kerberos

home help back first fref pref prev next nref lref last post

Re: an_to_ln

daemon@TELECOM.MIT.EDU (raeburn@ATHENA.MIT.EDU)
Sat Nov 14 01:43:19 1987

From: raeburn@ATHENA.MIT.EDU
To: Saltzer@ATHENA.MIT.EDU
Cc: kerberos@ATHENA.MIT.EDU
In-Reply-To: Jerome H. Saltzer's message of Sat, 14 Nov 87 01:03:41 EST <8711140603.AA02985@HERACLES.MIT.EDU>


If the user (Jon) does figure out that he has been logged into my
account, it may not be possible for him to delete the mapping.
Consider a .cshrc which says "exec myhack", which only allows escape
to a shell with a magic password.  It could also fake a failed login
attempt.

Actually, where Bill mentions that Jon would get "jon has not given
permission ....", I had been assuming that the mapping was automatic
and it would be logging him into my account -- I forgot for the moment
that the username requested on the opposite end is specified elsewhere
in that particular protocol, so that what I suggest for rlogin would
not work.  For protocols that depend wholly on Kerberos for
authentication, however, this would not provide a way out.

It would be very difficult to deal with inter-realm activities that
require usernames without some sort of mapping from
Kerberos-authenticated entity to user.  All that is needed is the
proper caution in permitting the mappings to be set up.

home help back first fref pref prev next nref lref last post