Excerpts from mail: 9-Feb-94 Re: [EMAIL PROTECTED] (994*)

> > The drawback to this kind of system, obviously, is
> > that your AFS security becomes vulneralbe to the same breaches that NFS
> > is susceptible  to.

> Actually, this is not at all obvious.  I would like to see a careful
> analysis of the additional security risks posed by the NFS translator.
> I asked this list about this a while back and got nothing.

Just off the top of my head:

1.  You have to run knfs on the translator machine to associate
    tokens with a specific hostname and userid for an nfs mount.  Using
    telnet or rsh into the translator machine to do this results in your
    password being sent over the network in the clear.

2.  You have to run knfs on the translator machine to destroy your
    tokens.  Users forget to do this.

3.  An imposter can set up a machine/account to pose as someone
    else's hostname/userid, thereby fooling the translator into using
    someone else's tokens to access AFS.

4.  The translator machine's IP address is used for the AFS accesses
    it makes on behalf of its NFS clients.  If the translator's IP
    address or subnet is placed on an ACL, all of its NFS clients will
    be granted those access rights.  Of course, IP addresses on ACLs
    aren't a great idea, even if they worked reliably, which they don't.

Plus, the NFS/AFS Translator is buggy, and Transarc isn't making
perceptible progress in fixing it.  We can hardly wait to get rid of it
here.

Other possibilities for accessing AFS from PCs are to use various ports
of MicroSoft's Lan Manager for UNIX (LMU) or Novell's Netware for UNIX. 
We're just beginning to do this, but expect (at least) to run into
authentication problems we'll have to get around.

Please let me know if you hear of other ideas.

Thanks,

-keith

Reply via email to