Re: [PATCH] Secure user authentication for NFS using RPCSEC_GSS [0/6]

From: Trond Myklebust (trond.myklebust@fys.uio.no)
Date: Mon Jan 13 2003 - 07:09:21 EST


>>>>> " " == Paul Jakma <paulj@alphyra.ie> writes:

> On 12 Jan 2003, Dax Kelson wrote:
>> Standard NFS security/authentication sucks rocks. Without this
>> NFS home directory servers are just waiting to be ransacked by
>> a rouge (or compromised) root user on a client machine.

> AIUI, A root user still can. The users krbv5 credentials will
> generally have been cached to storage. (though i suppose one
> could mount that storage via NFS and use root_squash, but
> that's little protection.).

Once the root account has been compromised, it is 'Game Over' no
matter what you do. Kerberos or no Kerberos, the simplest way to steal
your identity is simply for the attacker to listen in on your tty
while you are typing your password.

The RPCSEC_GSS security model is not meant to protect you against root
monitoring. It is meant to prevent some third party (on another
machine for instance) from spoofing RPC requests in you name (==
strong authentication), intercepting valid RPC requests and modifying
the payload (== cryptographic data integrity checking), or listening
in on the client/server communication (== data privacy).

Cheers,
  Trond
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/



This archive was generated by hypermail 2b29 : Wed Jan 15 2003 - 22:00:45 EST