home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.unix.questions
- Path: sparky!uunet!charon.amdahl.com!pacbell.com!att!linac!convex!convex!thurlow
- From: thurlow@convex.com (Robert Thurlow)
- Subject: Re: NFS security flawed (was: Re: chown : HELP!)
- Sender: usenet@news.eng.convex.com (news access account)
- Message-ID: <thurlow.715212393@convex.convex.com>
- Date: Sun, 30 Aug 1992 22:06:33 GMT
- References: <id.2FQS.7B6@ferranti.com> <p6c4vho@rhyolite.wpd.sgi.com> <4x91H880a9@atlantis.psu.edu> <14371@auspex-gw.auspex.com>
- Nntp-Posting-Host: dhostwo.convex.com
- Organization: Engineering, CONVEX Computer Corp., Richardson, Tx., USA
- X-Disclaimer: This message was written by a user at CONVEX Computer
- Corp. The opinions expressed are those of the user and
- not necessarily those of CONVEX.
- Lines: 44
-
- In <14371@auspex-gw.auspex.com> guy@Auspex.COM (Guy Harris) writes:
-
- >NFS, when using "UNIX authentication" has a simple "UID-mapping" scheme;
- >the NFS server can map a user ID of 0 to another user ID. AT&T's RFS,
- >and, I believe, some NFS implementations, allow a more elaborate mapping
- >to be done, which can map other user IDs as well; RFS may support
- >different UID maps for different clients, but I don't know if any NFS
- >implementations do so.
-
- We've experimented with a mapping mechanism that looks pretty reasonable.
- It has some inherent wrinkles due to the information loss that occurs
- when your client UID collides with a UID that exists on the server, but
- that's unavoidable.
-
- >Some ONC RPC implementations support "DES authentication", and allow NFS
- >to use that as well as "UNIX authentication". With "DES
- >authentication", the credentials are encrypted with a password derived,
- >in part, from the user's password, and include an encrypted "verifier"
- >to make it harder to forge credentials and have the forged credentials
- >appear valid. It can be a pain to set up and get working, and I've
- >heard claims that it's possible to crack the encryption scheme.
-
- IMHO, the worst problem is that there is no way in either the tools
- nor the keyserver protocol to announce that you will be logging off
- now; if you've ever authenticated yourself to a server, you can't ask
- it to forget that information, and are more vulnerable to spoofing.
- I can't for the life of me figure out why Sun didn't at least define
- the protocol operations for this so that people could implement it
- themselves.
-
- >I don't know what the Andrew File System does to detect forged
- >credentials, nor what OSF's DCE DFS will do, nor what any other
- >distributed file systems do.
-
- The AFS and DCE mechanisms are more-or-less vanilla Kerberos; this
- means that the security server is the critical link in the entire chain.
- I only have vague positive impressions about DFS security that still
- have to be validated.
-
- Rob T
- --
- Rob Thurlow, thurlow@convex.com
- Across the evening sky, all the birds are leaving
- But how can they know it's time for them to go? - Sandy Denny
-