Re: PAM and Kerberos

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> > There is nothing wrong with this.  A properly installed telnetd
> > supporting the telnet AUTH option will be configured to either allow
> > this behavior or not depending on the administrator's preferences.
> > There are four levels of acceptable login:
> 
> Yes, but, I think Michael was writing in the context of /bin/login,
> PAMified, instead of login.krb5.

how does the use of PAM in /bin/login change the security issues?

> I think we need to have a liblogin and a /bin/login based on that, that
> liblogin needs to be PAMified, that telnetd should use liblogin and so
> on. The crucial issues include: how to communicate to login, and thence
> PAM, just how the user was authenticated, if at all, with what system
> and to which principal; we also need to be able to inform login, and
> PAM, about the security of the TTY.
> 
> Then we could push handling of valid/user/other/unknown to PAM, where it
> belongs.

how does this belong in PAM?  PAM does not support any equivalent
concept.  If authentication is being perform by telnetd/sshd/ftpd then
PAM is not involved for authentication.

Authorization is perform via the krb5_kuserok() function.  If the
installer wants PAM to be used for authorization then this function
needs to be modified, not telnetd.

> > > And the only reliable solution to this is to have login's
> > > functionality built-in to telnetd, so that it will have full
> > > control for tickets _and_ usernames.
> > 
> > I am leaning in this direction for other reasons.
> 
> I think that is a good thing to do, and if there's a liblogin, then base
> /bin/login on liblogin.

you are assuming that /bin/login can be replaced.  I'm not.  I'm
working on the assumption that I do not want each and every
application to require its own version of /bin/login.  I want the
telnetd/sshd/... packages separated from the Kerberos tree so that
they can be supported independently.  Part of the problem with secure
telnet right now is that there are too many versions that have forked
in different directions.  I want one package that can support any/all
of the authentication methods as selected by the administrator.
(K4,K5,SRP,TLS,SKIPJACK,...)

> Yes, but, plenty of code exists that could be fashioned into what we've
> been talking about. We can specify liblogin and its interaction with
> PAM, we can turn a PAMified login into liblogin, and we can take one of
> the various PAM_KRB5 modules, touch it up and fit it in.

I am not of the belief that PAM should be involved in services that
perform non-interactive (protocol based) logins.  PAM can be
configured to require multiple passwords for multiple authentication
modules.  This is incompatible with non-interactive authentication as
supported by telnetd/sshd/ftpd/...



                  Jeffrey Altman * Sr.Software Designer
                 The Kermit Project * Columbia University
               612 West 115th St * New York, NY * 10025 * USA
     http://www.kermit-project.org/ * kermit-support@kermit-project.org






[Index of Archives]     [Fedora Users]     [Kernel]     [Red Hat Install]     [Linux for the blind]     [Gimp]

  Powered by Linux