18.12.2012 Views

O'Reilly - Practical UNIX & Internet Sec... 7015KB

O'Reilly - Practical UNIX & Internet Sec... 7015KB

O'Reilly - Practical UNIX & Internet Sec... 7015KB

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

[Chapter 19] 19.6 Kerberos<br />

●<br />

●<br />

<strong>Sec</strong>ure RPC stores both the user's secret key and public key on the NIS server. The secret key is<br />

encrypted with the user's password and made available to the network, but the network does not<br />

have the ability to decrypt it. Thus, with <strong>Sec</strong>ure RPC, there is no need for a specially secured<br />

"authentication server" to establish the identity of users on the network.<br />

<strong>Sec</strong>ure RPC is built into Sun's RPC system. While Kerberos requires that each application be<br />

specifically tailored. <strong>Sec</strong>ure RPC is a transparent modification to Sun's low-level RPC that works<br />

with any RPC-based service. Any application can use it simply by requesting AUTH_DES<br />

authentication.[18]<br />

[18] If you are using recent versions of Sun's Solaris operating system, you can<br />

specify Kerberos authentication by requesting AUTH_KERB.<br />

Kerberos is an add-on system that can be used with any existing network protocol. Project Athena uses<br />

Kerberos with NFS, remote login, password changing, and electronic mail. Sun Microsystems has added<br />

compatibility with Kerberos to its RPC system. Other software vendors, including the Open Software<br />

Foundation and IBM, have used the ideas pioneered by Kerberos as the basis of their own network<br />

security offerings.<br />

19.6.3 Installing Kerberos<br />

Installing Kerberos is a complicated process that depends on the version of Kerberos you have, the kind<br />

of computer, and the version of your computer's operating system. It's a difficult task that requires that<br />

you either have the source code for your computer system, or that you have source code for replacement<br />

programs. It is not a task to be undertaken lightly.<br />

Fortunately, increasingly you don't have to. Kerberos or Kerberos-like security systems are now available<br />

from several companies, as well as being a standard part of several operating systems. These days, there<br />

is no reason to be running anything but secure network services.<br />

The Kerberos source code is available for the cost of reproduction from MIT; the address and ordering<br />

information are provided in Appendix E, Electronic Resources. Alternatively, you may use FTP to<br />

transfer the files over the <strong>Internet</strong> from the computer athena-dist.mit.edu.[19]<br />

[19] Because of export restrictions, only U.S. and Canadian citizens may do so legally.<br />

As the changes required to your system's software are substantial and subject to change, the actual<br />

installation process will not be described here. See the documentation provided with Kerberos for details.<br />

19.6.4 Using Kerberos<br />

Using a workstation equipped with Kerberos is only slightly different from using an ordinary<br />

workstation. In the Project Athena environment, all of the special Kerberos housekeeping functions are<br />

performed automatically: when the user logs in, the password typed is used to acquire a Kerberos ticket,<br />

which in turn grants access to the services on the network. Additional tickets are automatically requested<br />

as they are needed. Tickets for services are automatically cached in the /tmp directory. All of a user's<br />

tickets are automatically destroyed when the user logs out.<br />

file:///C|/Oreilly Unix etc/<strong>O'Reilly</strong> Reference Library/networking/puis/ch19_06.htm (7 of 9) [2002-04-12 10:44:58]

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!