Re: verify TGT in pam-kerberos

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Thanks for info Nico ,
 can someone please let me know about what is the latest situation in handling this
verify TGT, I will be very glad if someone let  me know where I can download the
latest libpam_krb5 if there is any ( hopefully) .

thanks
bandi


Nicolas Williams wrote:

> Think about this situation: the user logging in is also spoofing the AS-REP.
>
> Then the user knows his password (it could be anything).
>
> The key thing is: the client must be able to use a secret key to verify
> the authentication process.
>
> Our PAM_KRB5:pam_sm_authenticate() returns PAM_IGNORE if it cannot
> verify the AS exchange because of a missing keytab. It returns
> PAM_SUCCESS if it can very a successful AS exchange. It returns an error
> under other circumstances. Various options can change this behaviour.
>
> Nico
>
> On Tue, Sep 18, 2001 at 07:22:47PM +0530, SRIDHAR BANDI wrote:
> > Thank you so much for the clarification but I have a small doubt in that ,
> >
> >   When rlogind (for example)  is the server who makes as [AS_REQ] to the KDC on
> > behalf of the client (user) then the KDC to issues the [AS_REP] ( without any
> > preauthentication if no preauth are present) that contains the ticket(TGT) and
> > the encrypted data that can be decrypted by clients password, on receiving the
> > [AS-REP] the server (rlogind) will try to decrypt the data that is obtained
> > from the KDC , So the client is said to be authenticated if he knows the
> > password which can decrypt the data in [AS-REP] . Now if the KDC is spoofed
> > then the password of the clients also need to be known to the KDC so that the
> > client's password can be used to decrypt the packet as its at the server
> > (rlogind) end that the decryption  takes place. So I still have a doubt that,
> > will the spoofing of KDC be caught by doing verify_krb_v5_tgt() .
> > please help me out .
> >
> > I could think of a problem that is addressed with this is that when both the
> > user and the KDC are spoofed this will work , but even this will fail in the
> > case when the keytab file is not present for the serveras it will ignore the
> > case and allows the user in.
> >
> > thanks you so much for the help
> >
> > regards
> > bandi
> >
> >
> > Nicolas Williams wrote:
> >
> > > Also, one might want to use pam_krb5 with no keytab, as a convenience
> > > kinit. Thus, if there's no keytab pam_krb5:auth returns PAM_IGNORE, but
> > > it does fetch the TGT and its setcred() will create the ccache.
> > >
> > > Nico
> > >
> > > On Tue, Sep 18, 2001 at 09:04:35AM -0400, Nicolas Williams wrote:
> > > > AS replies can be spoofed as nothing in them authenticates the KDC to
> > > > the client doing the AS request. Therefore something must be done to
> > > > authenticate the AS reply or else you can't use Kerberos for password
> > > > validation. The thing to do is this: use the TGT from the AS reply to
> > > > get a TGT from the TGS (the KDC) for talking to a service corresponding
> > > > to the client and for which the client knows the current key -- if the
> > > > TGS response can be validated against such a key then the client knows
> > > > that the AS reply must is valid, that it came from the correct KDC and
> > > > was not spoofed.
> > > >
> > > > Cheers,
> > > >
> > > > Nico
> > > >
> > > >
> > > > On Tue, Sep 18, 2001 at 03:03:14PM +0530, SRIDHAR BANDI wrote:
> > > > >   I am sorry if I had hit the wrong list .
> > > > >   can someone enlighten me about the PAM Kerberos authentication (
> > > > > downloaded from fcusack) validating  the TGT that it obtained with the
> > > > > host service principal's keytab entry (using the funciton
> > > > > verify_krb_v5_tgt) , I dont understand the purpose of doing this because
> > > > > the server machine is the one who gets the TGT on behalf of the client(
> > > > > principal ) and its the one who is handling the host entry also . And
> > > > > this call fails if the keytab file exists and there is no valid entry
> > > > > for the host service principal and the authentication will be successful
> > > > > if there is a valid entry for host principal or there is no keytab file
> > > > > at all .
> > > > >
> > > > > thanks in advance for the help .
> > > > > bandi
> > > > >
> > > > >
> > > > >
> > > > >
> > > > >
> > > > > _______________________________________________
> > > > > 
> > > > > Pam-list@redhat.com
> > > > > https://listman.redhat.com/mailman/listinfo/pam-list
> > > > --
> > > --
> > > -DISCLAIMER: an automatically appended disclaimer may follow. By posting-
> > > -to a public e-mail mailing list I hereby grant permission to distribute-
> > > -and copy this message.-
> > >
> > > Visit our website at http://www.ubswarburg.com
> > >
> > > This message contains confidential information and is intended only
> > > for the individual named.  If you are not the named addressee you
> > > should not disseminate, distribute or copy this e-mail.  Please
> > > notify the sender immediately by e-mail if you have received this
> > > e-mail by mistake and delete this e-mail from your system.
> > >
> > > E-mail transmission cannot be guaranteed to be secure or error-free
> > > as information could be intercepted, corrupted, lost, destroyed,
> > > arrive late or incomplete, or contain viruses.  The sender therefore
> > > does not accept liability for any errors or omissions in the contents
> > > of this message which arise as a result of e-mail transmission.  If
> > > verification is required please request a hard-copy version.  This
> > > message is provided for informational purposes and should not be
> > > construed as a solicitation or offer to buy or sell any securities or
> > > related financial instruments.
> > >
> > > _______________________________________________
> > > 
> > > Pam-list@redhat.com
> > > https://listman.redhat.com/mailman/listinfo/pam-list
> >
> >
> >
> > _______________________________________________
> > 
> > Pam-list@redhat.com
> > https://listman.redhat.com/mailman/listinfo/pam-list
> --
>
> Visit our website at http://www.ubswarburg.com
>
> This message contains confidential information and is intended only
> for the individual named.  If you are not the named addressee you
> should not disseminate, distribute or copy this e-mail.  Please
> notify the sender immediately by e-mail if you have received this
> e-mail by mistake and delete this e-mail from your system.
>
> E-mail transmission cannot be guaranteed to be secure or error-free
> as information could be intercepted, corrupted, lost, destroyed,
> arrive late or incomplete, or contain viruses.  The sender therefore
> does not accept liability for any errors or omissions in the contents
> of this message which arise as a result of e-mail transmission.  If
> verification is required please request a hard-copy version.  This
> message is provided for informational purposes and should not be
> construed as a solicitation or offer to buy or sell any securities or
> related financial instruments.
>
> _______________________________________________
> 
> Pam-list@redhat.com
> https://listman.redhat.com/mailman/listinfo/pam-list





[Index of Archives]     [Fedora Users]     [Kernel]     [Red Hat Install]     [Linux for the blind]     [Gimp]

  Powered by Linux