[7290] in Kerberos

home help back first fref pref prev next nref lref last post

Re: Kerberized RCP

daemon@ATHENA.MIT.EDU (Sam Hartman)
Thu May 16 01:46:30 1996

To: jik@annex-1-slip-jik.cam.ov.com (Jonathan Kamens)
Cc: kerberos@MIT.EDU
From: Sam Hartman <hartmans@MIT.EDU>
Date: 16 May 1996 01:29:49 -0400
In-Reply-To: jik@annex-1-slip-jik.cam.ov.com's message of 15 May 1996 05:58:58 GMT

>>>>> "Jonathan" == Jonathan Kamens <jik@annex-1-slip-jik.cam.ov.com> writes:

    Jonathan> In article
    Jonathan> <199605141427.KAA10312@gza-client1.cam.ov.com>,
    Jonathan> don@cam.ov.com (Donald T. Davis) writes: |> you're
    Jonathan> describing a use of the "user-to-user" protocol.

    Jonathan> Why do you say that this is u2u?  Fred and Barney are
    Jonathan> workstations, not users.  Why wouldn't the standard
    Jonathan> mechanism of rcp on Fred getting a service ticket for
    Jonathan> host/Barney and Barney verifying that ticket from its
    Jonathan> /etc/v5srvtab file work?

	Don comes from a mind set that strongly believes that
workstations outside locked rooms should not have keytabs.  As an
example, he stated that it would be a very bad idea for laptops to
have a keytab (besides the naming issue) because it is fairly easy to
gain physical access to a laptop.

	We discussed the broken way that Rcp uses U2U previous to Beta
6.  At that time, we also discussed what would be necessary to support
user-to-user authentication  for kshd and klogind.  Personally, I
think it would be fairly nice if Athena's access_on could enable kshd
and klogind in such a way that they could use a ticket cache of the
user running access_on to allow for secure connection to public
cluster machines.  

	This code has not been written yet, and MIT has not committed
to writing it.  I think the concept is worth discussing and I
certainly think user-to-user could be much more utilized than it is
today.  I also think that mindsets in the Kerberos community have
changed significantly since the original design of the protocol;
because every workstation with a non-trivial root password tends to
have a srvtab in the Kerberos environments I'm familiar with, u2u
loses much of its utility.


    Jonathan> |> it seems |> that the kerberized rcmds use only u2u,
    Jonathan> so the remote host |> has to have a tgt; they don't yet
    Jonathan> work correctly if the |> remote host has a srvtab
    Jonathan> instead.

    Jonathan> I'm not at all sure why you say that.  I use krlogin,
    Jonathan> krsh and krcp regularly to remote hosts with
    Jonathan> /etc/v5srvtab files.  As far as I know, krlogin, krsh
    Jonathan> and krcp work *only* if the server host has a
    Jonathan> /etc/v5srvtab file, and don't understand u2u at all (at
    Jonathan> least, that was true as of V5 beta 4; I don't know if it
    Jonathan> was significantly changed in V5 beta 5, although I doubt
    Jonathan> it).

    Jonathan> (Incidentally, although I wrote the above from the V5
    Jonathan> perspective, it's equally true for V4.)


home help back first fref pref prev next nref lref last post