On 8 January 1998 Ken Hornstein wrote;

Hi,

 MS>> First off all, why doesn't kas look at the AFS token in the current
 MS>> shell? The search order for password is;

 MS>> 1: -admin switch
 MS>> 2: Unix UID

 MS>> I think it shoud be;

 MS>> 1: -admin switch
 MS>> 2: AFS token in the shell
 MS>> 3: Unix UID

 KH> Unfortunately, this isn't possible.

 KH> When you use "klog", you're getting (essentially) a Kerberos service
 KH> ticket for the afs service.  However, when you run kas, you're getting
 KH> a service ticket for the Authuser.Admin service.  You can't use the
 KH> AFS service ticket for talking to the kaserver - it simply won't
 KH> recognize it.

I didn't say that the kas program should use the AFS service ticket, just 
look in it to see for which password the kas program shall ask.

 KH> Note that this is a deliberate design decision - otherwise someone
 KH> coul come up to an unattended workstation and change a user's password
 KH> without having to enter in the original password first.

Once again. In this part of my mail I just suggested that tha kas program 
should look in the ticket, not use it in any way.

 KH>  If one of your AFS admins left their workstation unattended or used
 KH> the amazingly insecure AFS token passing rsh, then an attacker could
 KH> do all sorts of evil things with kas.

Yes, I know that.

 KH> BTW, only a few of the AFS commands check the Unix userid ... and this
 KH> is only done for the root vs non-root case.  Certainly none of the
 KH> commands that talk to other machines check the Unix userid.

Okey, I understand that some commands needs to know if the user is root or 
not. But when kas asks me for my password it is more interesting to ask for 
the password for the "owner" of the AFS service ticket.

 MS>> The second question is about the "kas examine" command. Today
 MS>> everyone always have to enter a password when they do an examine. I
 MS>> don't like that.

 KH> See above; you can't get around it (well ... that's not _exactly_
 KH> true).

Transarc could rewrite the kas program. And my real question is if that 
would be a sequrity problem or not.

 MS>> You will ask me why. In our cell we don't use the Transarc AFS login 
 MS>> program, we are using a special version of XDM login and Athena
 MS>> Kerberos telnet.

 KH> It sounds like you should really be running a Kerberos KDC.

What I know about, there is no Krb V5 outside US with full encryption. And 
for Krb V4 I think that the KA server have some extra features, like expire 
date for the accounts. And of cause today we are running KA server, we 
don't want to replace it if it isn't necessary.

 MS>> So today the users don't get any warning messages before the 
 MS>> password expires. We have an idea of creating a shell script that do
 MS>> a "kas examine <loginuser>" at logintime that views a warning
 MS>> message. But today the users have to enter their own passwords to get
 MS>> that type of scripts to work okey. And the users don't like to type
 MS>> their passwords a second time they login.

 MS>> The second thing is that we have some administative scripts that
 MS>> needs to look in the KAS database. If I have a ADMIN token when I run
 MS>> this type of script it would be much easier, today I have to enter my
 MS>> password each time the script do an "kas examine".

 KH> There _is_ a way around this.

 KH> kas won't ask for a password if you already have a token for
 KH> Authuser.Admin.  But, AFAIK, there is no way (other than internally
 KH> to kas) to get a service ticket for Authuser.Admin.  So you would
 KH> have to hack your login/script process to get an Authuser.Admin ticket
 KH> and then you should be able to run "kas" without any problems.  This
 KH> has it's own wonderful security problems, though.

Or could it be possible that "kas examine" used the AFS service ticket 
instead of the Authuser.Admin ticket? I think that all the other kas 
commands should use the Authuser.Admin ticket. Just change the 
impementation of "kas examine".

Would that kind of change open up a big sequrity hole or not?

Examine don't show any encrypted passwords, just the version number and the 
checksum. You need to know the name of the instance you would like to 
examine and so on.

So even if I forgot to lock my screen and some bad person started to use my 
computer he shouldn't get to much information.

Or have I missed some important part here?

                                 _\\|//_
                                 (-0-0-)
/------------------------------ooO-(_)-Ooo-----------------------------\
| Magnus Sandberg    Email: [EMAIL PROTECTED]    http://www.it.kth.se/~mem |
| Systems admin, Royal Institute of Technology/Dep. of Teleinformatics |
| Phone: +46-8-752 14 46  FAX: +46-70-711 53 03  GSM: +46-70-716 62 06 |
\----------------------------------------------------------------------/
                                 ||   ||
                                ooO   Ooo


Reply via email to