[Review Request] Kerberose 5 patch. Version two!
Tom Rhodes
trhodes at FreeBSD.org
Thu Sep 4 17:54:17 UTC 2003
On Thu, 4 Sep 2003 11:44:44 -0600
Tillman Hodgson <tillman at seekingfire.com> wrote:
> On Thu, Sep 04, 2003 at 12:49:22PM -0400, Tom Rhodes wrote:
> > On Thu, 4 Sep 2003 11:15:31 -0600
> > Tillman Hodgson <tillman at seekingfire.com> wrote:
> > > I agree - my original draft had it in all caps. I suspect it got lost
> > > when the .prv TLDs were changed to .org.
> >
> > I've already done this in my new diff.
>
> Thanks Tom!
>
> I promise to learn SGML (and not attempt to preach LaTeX ;-) ) sometime
> soon *grin*.
I like LaTeX, I think. :P
>
> > Well, I have an idea on how to do this. Something like:
> >
> > <note>
> > <para>When using Kerberos in a large network, and insist on using
> > DNS services, then the following information could be added to
> > the DNS configuration: ...
> >
> > With the correct markup of course.
>
> I like it. The word "insist" might be a bit strong (it /is/ a good idea
> for some/most environments, after all). How does "prefer" sound?
>
> A pointer to section 2.14 of the Kerberos FAQ and the MIT install guide
> "Mapping Hostnames onto Kerberos Realms" section (both already in our
> references) which talk about DNS issues for multi-homed hosts and
> setting up DNS (respectively) might make sense here. The NetBSD
> reference that was previously mentioned could also come into play here.
Well, I removed insist. Actually, I came up with this:
<note>
<para>For large networks with a properly configured
<acronym>BIND</acronym> <acronym>DNS</acronym> server, the
above example could be trimmed to:</para>
<programlisting>[libdefaults]
default_realm = example.org</programlisting>
<para>With the following lines being appended to the
<hostid role="fqdn">exmple.org</hostid> zonefile:</para>
<programlisting>_kerberos._udp IN SRV 01 00 88 kerberos.example.org.
_kerberos._tcp IN SRV 01 00 88 kerberos.example.org.
_kpasswd._udp IN SRV 01 00 464 kerberos.example.org.
_kerberos-adm._tcp IN SRV 01 00 749 kerberos.example.org.
_kerberos IN TXT EXAMPLE.ORG.</programlisting></note>
This gives us a sentence which reads as "it could be done this way,
but you are not required to do so."
>
> > > > In a multi-user environment, Kerberos is less secure. This is because
> > > > it stores the tickets in the /tmp directory, which is readable by all
> > > > users. If a user is sharing a computer with several other people
> > > > simultaneously (i.e. multi-user), it is possible that the user's
> > > > tickets can be stolen (copied) by another user."
> > > >
> > > > If the files are world-readable in /tmp then I agree,
> > > > but to be honest that's a bug that shouldbefixed.
> > >
> > > It's not probably not completely fixable - whoever has root powers has
> > > the capability to "become" any user by using their Kerberos ticket.
> > > Granted, root has that power already but this extends it beyond the
> > > local machine. Users may not expect (or want) that.
> > >
> >
> > Perhaps we could recommend that /tmp have different permissions set?
> > Although, I have never ran a Kerberos server I do not want to just give
> > a set of permissions without knowing how they would affect Kerberos.
>
> I might be misreading that, so just to be safe I'll clarify: this
> problem doesn't affect the KDC, it affects all workstations.
>
> Changing the permissions on /tmp for all workstations might be a
> contentious recommendation. Most Kerberos applications will take an
> environment variable to tell them to look elsewhere for the ticket,
> though this isn't truly standardized and still doesnt' solve the "root
> user problem".
>
> I'm not sure that this is a problem that documentation can solve :-)
Then I'll ignore the change I was going to make and just leave the
paragraph as it was. Thanks!!
--
Tom Rhodes
More information about the freebsd-doc
mailing list