Nicolas Williams wrote:
> On Tue, Mar 04, 2008 at 10:20:50AM +0000, Darren J Moffat wrote:
> > Roland Mainz wrote:
> > > Would be there any (technical) objections to modify "useradd" to add
> > > entries to /etc/publickey by default (and assign a default host key for
> > > the machines, too) ?
> > > The idea is to get SecureRPC working by default on a plain Solaris
> > > installation to allow users to use X11's SUN-DES-1 authentification
> > > scheme instead of MIT-MAGIC-COOKIE-1 stuff (e.g. use $ xhost +username@
> > > # instead of shuffeling cookies around which should be much more
> > > user-friendly) and/or use SecureRPC for NFS...
> >
> > Sounds like a great idea to me.
> 
> Is it?
> 
> The files and NIS backends for publickey(4) only supports 192-bit keys,
> which are too weak,

Which is (AFAIK) fixable (isn't there even a RFE for that already ?) ...

> and without NIS/NIS+/LDAP then you get no non-local
> benefit from having any entries in /etc/publickey unless you manually
> maintain it.

Right... but it's still easier to handle than setting-up Kerberos5 (and
the matching X11 MIT-KERBEROS-5 auth. is currently broken (which is on
my ToDo list), leaving SUN-DES-1 as the only functional user2user
authentification scheme in X11) or NIS+ (which Sun tries to remove at
some point (which is IMO a pitty since once it has become mature Sun
wants to get rid of it... ;-( )) and better than the current defaults
(for NFS users it's MUCH better than the uid+gid auth and works around
the "number of groups per user"-limit and for X11 it's much more
user-friendly to give an "user" access to the display then explain your
users how the abstract concept of cookies should work (and most of them
don't understand it anyway and use $ xhost + # (= disable access control
completely) instead. From my experience the $ xhost +username@ # thing
solved at least this problem ((non-IT) users falling back to $ xhost +
#) nicely... :-) )).

> Network security requires the deployment of authentication
> infrastructure or ad-hoc, SSH publickey-like leap-of-faith
> authentication.  The files backend of publickey(4) != either.
> 
> Also, I'm not sure that any method of X11 display authentication other
> than cookies makes sense unless we want users to be able to share their
> displays with *other* users.

The need to share displays is quite common at least on universities
and/or if you want to do something like a presentation or demo in such
an environment. From my experience the syntax of $ xhost +username@ # is
MUCH more user-friendly.

> Consider: if the only reason to forward krb5 creds to a remote server is
> so I can use them to open my local display then I've given that server
> the ability to impersonate me to all others just so I could access my
> display from that server -- how odd!  I could just use cookies, and then
> I need not give that server anything too valuable.  X11 cookies works
> *fine* for SSH.

I disagree for the "fine" - it just works very poorly. The ssh port
forwarding+encryption+decryption needs giant amounts of CPU time and
adds lots of latency and even defeats all the fine-grained buffer
flushes in the X11 code by just copying the data without caring about
things like X11 packet boundaries. Just try a simple experiment and run
quake2 remotely, one time via normal X11 and one time via ssh
forwarding. The ssh forwarding makes such an application unuseable (or
the more real-world experiment would be X11 over a high-latency
(satellite) link - if you use ssh the applications will become
unuseable...).
(There are other issues like that last time I checked their code OpenSSH
doesn't use the SECRUITY extension to make new MIT-MAGIC-COOKIEs and
just shares the original one (which is a serious security issue,
something which ssh.com's version of ssh fixed long ago by trying to use
the SECURITY extension first) or that the obsolete cookies aren't
removes properly either)

----

Bye,
Roland

-- 
  __ .  . __
 (o.\ \/ /.o) roland.mainz at nrubsig.org
  \__\/\/__/  MPEG specialist, C&&JAVA&&Sun&&Unix programmer
  /O /==\ O\  TEL +49 641 7950090
 (;O/ \/ \O;)

Reply via email to