18.12.2012 Views

O'Reilly - Practical UNIX & Internet Sec... 7015KB

O'Reilly - Practical UNIX & Internet Sec... 7015KB

O'Reilly - Practical UNIX & Internet Sec... 7015KB

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

[Chapter 8] 8.7 One-Time Passwords<br />

Kerberos and DCE: Alternatives to One-Time Passwords?<br />

Kerberos and DCE are two systems which allow workstations to authenticate themselves to services<br />

running on servers without ever sending a password in clear text over the network. At first glance, then,<br />

Kerberos and DCE appear immune to password sniffers. If used properly, they are so.<br />

Unfortunately, Kerberos and DCE have their drawbacks. The first is that both systems require<br />

modification to both the client and the server: you cannot connect to a Kerberos service from any<br />

workstation on the <strong>Internet</strong>. Instead, you can only use workstations that are specially configured to run<br />

the exact version of Kerberos or DCE which your server happens to use.<br />

A bigger problem, though, happens when users try to log into computers running Kerberos over the<br />

network. Take the example of an MIT professor, who wishes to access her MIT computer account from a<br />

colleague's computer at Stanford. In this case, the professor will sit down at the Stanford computer, telnet<br />

to the MIT computer, and type her password. As a result, her password will travel over the <strong>Internet</strong> in the<br />

clear on its way to the secure Kerberos workstation. In the process, it may be picked up by a password<br />

sniffer. The same could happen if she were using one of the many DCE implementations currently<br />

available.<br />

Of course, Kerberos isn't supposed to work in this manner. At Stanford, the MIT professor is supposed to<br />

be able sit down at a Kerberos-equipped workstation and use it to transmit an encrypted password over<br />

the <strong>Internet</strong> using the standard Kerberos encryption scheme. The problem, though, is that the workstation<br />

must be able to locate the Kerberos server at MIT to use it, which often requires prior setup. And the<br />

Kerberos- (or DCE-) equipped workstation, with compatible versions of the software, needs to be at<br />

Stanford in the first place. Thus, while Kerberos and DCE may seem as if they are alternatives to<br />

one-time passwords, they unfortunately are not in many real-world cases.<br />

The Kerberos system's biggest problem, though, is that it still allows users to pick bad passwords and to<br />

write them down.<br />

8.6 The <strong>UNIX</strong> Encrypted<br />

Password System<br />

8.8 Administrative<br />

Techniques for Conventional<br />

Passwords<br />

[ Library Home | DNS & BIND | TCP/IP | sendmail | sendmail Reference | Firewalls | <strong>Practical</strong> <strong>Sec</strong>urity ]<br />

file:///C|/Oreilly Unix etc/<strong>O'Reilly</strong> Reference Library/networking/puis/ch08_07.htm (7 of 7) [2002-04-12 10:44:31]

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!