The Unix Heritage Society mailing list
 help / color / mirror / Atom feed
From: Grant Taylor via TUHS <tuhs@minnie.tuhs.org>
To: tuhs@minnie.tuhs.org
Subject: Re: [TUHS] YP / NIS / NIS+ / LDAP
Date: Tue, 6 Nov 2018 17:35:04 -0700	[thread overview]
Message-ID: <7e9e6546-6575-e4d5-caf8-52c504f5a953@spamtrap.tnetconsulting.net> (raw)
In-Reply-To: <CAEoi9W7mJD2y29KPj1av_Lpnpd=AYgLwL-G7HjKYjo-B69ejHA@mail.gmail.com>

[-- Attachment #1: Type: text/plain, Size: 3438 bytes --]

On 11/06/2018 03:24 PM, Dan Cross wrote:
> Isn't that authorization?

Not really.

Authentication is proving that you are who you claim to be.  -  Show 
your drivers license to the bouncer.

Authorization is deciding if the authenticated entity is allowed to have 
access or not.  -  Is your name on the list of people allowed into the 
nightclub?

Access Control - The bouncer, allowing you in or physically barring you 
from entering.

Each is a discrete function.  They all work in close concert with each 
other.

> Not really. It provides the data that lets one perform a relatively weak 
> validation of e.g. a password, but it is not *itself* an authentication 
> protocol.

Fair enough.

> Older versions of Kerberos often included modified versions of popular 
> servers and their clients that had been modified to use the kerberos 
> protocol for authentication, and also often to encrypt communications.

I take it that you mean that the Kerberos software that was distributed 
also included an alternate telnet / rsh / etc daemon that took advantage 
of Kerberos.

> For example, the version of `telnet` that shipped with MIT kerberos back 
> in the day had an option that could be used to encrypt the data stream; 
> similarly with rlogin, et al.

*nod*

> I have a dim memory that the version of FTP might support encryption 
> for the control connection but not data connections (but I also might be 
> purely imagining that).

Maybe.  There has been a LOT of energy put into FTP.

> I'm guessing most of this stuff has been dropped from more recent 
> distributions

Likely.

> because...really...telnet?

~chuckle~

I supported multiple old Solaris 6 machines about 5 years ago that I 
still had to use telnet to connect to.

I feel like telnet as a service REALLY does need to go away.  That being 
said, I still find the telnet (or any NVT) client a valuable diagnostic 
tool.

> What I meant is that SSH supports a limited sense of checking whether 
> a given key matches and making a yea or nay decision based on that.

I'm not sure I understand what you're alluding to.  But that's getting 
off topic.  So I digress.

> Correct. `ypcat passwd` often gave you a bunch of hashed passwords in 
> field two of a stream 7th Edition /etc/passwd formatted entries.

I would have hoped that there would have been some intelligence to only 
return the record of the person requesting the information.  Or that the 
password field was redacted for other users.

I guess the ypcat binary could be augmented to do that filtering client 
side.  But that still leaves the underlying problem there for alternate 
NIS clients.

> I have, again, some vague memory that at some point this was changed so 
> that root on the localhost could get a shadow-style map, but normal users 
> couldn't see the password hashes. But I might totally be making that up, 
> and of course, it wasn't robust security since what went over the wire 
> wasn't encrypted and breaking root on a host could still get you all 
> the hashes on the network.

It's still subject to alternate ypcat impersonation binaries too.

> Contrast with Kerberos, where breaking root on a host doesn't compromise 
> much beyond that host (modulo leveraging that to steal user passwords 
> and the like).

ACK

> Ha! That's a hoot.

;-)



-- 
Grant. . . .
unix || die


[-- Attachment #2: S/MIME Cryptographic Signature --]
[-- Type: application/pkcs7-signature, Size: 3982 bytes --]

  reply	other threads:[~2018-11-07  2:49 UTC|newest]

Thread overview: 64+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-11-04 20:51 Grant Taylor via TUHS
2018-11-04 21:46 ` Ben Greenfield via TUHS
2018-11-04 22:45 ` Arthur Krewat
2018-11-04 22:58 ` Mantas Mikulėnas
2018-11-04 23:49   ` Warner Losh
2018-11-05  3:16 ` Robert Brockway
2018-11-05  6:08   ` Grant Taylor via TUHS
2018-11-05  7:24     ` Mantas Mikulėnas
2018-11-05  7:33       ` Mantas Mikulėnas
2018-11-05 16:12       ` Arthur Krewat
2018-11-05 19:32         ` Grant Taylor via TUHS
2018-11-05 22:43           ` Arthur Krewat
2018-11-06  5:25             ` Grant Taylor via TUHS
2018-11-06 16:50               ` Arthur Krewat
2018-11-06 19:43                 ` Grant Taylor via TUHS
2018-11-05 19:27       ` Grant Taylor via TUHS
2018-11-05 19:36       ` Grant Taylor via TUHS
2018-11-05 21:36         ` Mantas Mikulėnas
2018-11-05 23:12           ` Grant Taylor via TUHS
2018-11-05 21:43         ` Ben Greenfield via TUHS
2018-11-06  4:58           ` Grant Taylor via TUHS
2018-11-06 12:59             ` Ben Greenfield via TUHS
2018-11-06  6:53           ` Mantas Mikulėnas
2018-11-06 13:21             ` Ben Greenfield via TUHS
2018-11-06 13:44               ` Mantas Mikulėnas
2018-11-06 14:00                 ` Ben Greenfield via TUHS
2018-11-06 13:46               ` Mantas Mikulėnas
2018-11-05 22:34         ` Dan Cross
2018-11-06  5:24           ` Grant Taylor via TUHS
2018-11-06  7:07             ` Mantas Mikulėnas
2018-11-06 17:30               ` Grant Taylor via TUHS
2018-11-06 19:58                 ` Mantas Mikulėnas
2018-11-06 22:24             ` Dan Cross
2018-11-07  0:35               ` Grant Taylor via TUHS [this message]
2018-11-07 11:37                 ` Pete Turnbull
2018-11-07 17:30                   ` Grant Taylor via TUHS
2018-11-07 22:01                     ` Dave Horsfall
2018-11-08  1:48                       ` Dave Horsfall
2018-11-07 23:00                     ` Pete Turnbull
2018-11-07  1:03             ` Pete Turnbull
2018-11-06 12:54           ` Ben Greenfield via TUHS
2018-11-05 20:10     ` Dave Horsfall
2018-11-05  3:49 ` Larry McVoy
2018-11-05  6:12   ` Grant Taylor via TUHS
2018-11-05 19:58     ` Dave Horsfall
2018-11-05 22:53       ` Grant Taylor via TUHS
2018-11-06  1:28         ` Dave Horsfall
2018-11-05 15:44   ` Larry McVoy
2018-11-05 18:38     ` arnold
2018-11-05 19:04       ` Larry McVoy
2018-11-05 21:21         ` Noel Hunt
2018-11-07  8:58         ` arnold
2018-11-07 14:05           ` arnold
2018-11-05 20:48 ` A. P. Garcia
2018-11-05 23:07   ` Grant Taylor via TUHS
2018-11-06  1:46     ` Dan Cross
2018-11-06  5:32       ` Grant Taylor via TUHS
2018-11-06 22:29         ` Dan Cross
2018-11-07  0:40           ` Grant Taylor via TUHS
2018-11-07  1:38           ` Arthur Krewat
2018-11-06  3:03     ` Robert Brockway
2018-11-06  5:03       ` David Arnold
2018-11-06  5:34       ` Grant Taylor via TUHS
2018-11-06 23:59 Norman Wilson

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=7e9e6546-6575-e4d5-caf8-52c504f5a953@spamtrap.tnetconsulting.net \
    --to=tuhs@minnie.tuhs.org \
    --cc=gtaylor@tnetconsulting.net \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).