Hello Jim,

Thanks for pointing out the Phrack page.

I well remember being taught on the Transarc
AFS systems admin course to take care with ACLs.

    "If you set system:anyuser rl then expect that
     anyone could read the directory contents."

The fact that access may be from an HTTP/AFS gateway
makes no difference to this. Such gateways are useful.
I use a HTTP/DFS gateway to ensure access is blocked
to restricted parts of a DCE/DFS cell.

CellServDB should be considered "public knowledge" like DNS.

I believe there are more important issues that are key
to AFS security such as:
  a) restricted access (admin login only) dedicated
     database and fileservers (physically secure).
  b) regular monitoring for sensible passwords
  c) monitoring of server logs
  d) peer review of your processes/systems admin
  e) contracting a security team to test your setup
-- 
cheers
paul                             http://acm.org/~mpb

"Linux: the operating system with a CLUE... Command Line User Environment".

>Everyone may want to take a look at the following article that was in the
>latest issue of Phrack (9-9-99).
>
>  Black Book of AFS
>    http://www.phrack.com/search.phtml?view&article=p55-13
>
>A pretty simple and basic intro of AFS to the hacker community, however,
>it did reveal a couple of concerns.

[text deleted]

>-- 
>James J. Barlow   <[EMAIL PROTECTED]>
>Senior System Engineer
>National Center for Supercomputing Applications
>605 East Springfield Avenue                        Voice : (217)244-6403
>Champaign, IL 61820                                 Cell : (217)840-0601
>http://www.ncsa.uiuc.edu/People/jbarlow              Fax : (217)244-1987


Reply via email to