The Unix Heritage Society mailing list
 help / color / mirror / Atom feed
From: Dan Cross <crossd@gmail.com>
To: Grant Taylor <gtaylor@tnetconsulting.net>
Cc: TUHS main list <tuhs@minnie.tuhs.org>
Subject: Re: [TUHS] YP / NIS / NIS+ / LDAP
Date: Tue, 6 Nov 2018 17:24:02 -0500	[thread overview]
Message-ID: <CAEoi9W7mJD2y29KPj1av_Lpnpd=AYgLwL-G7HjKYjo-B69ejHA@mail.gmail.com> (raw)
In-Reply-To: <7d595808-fff7-4c1c-d969-362693ab2672@spamtrap.tnetconsulting.net>

[-- Attachment #1: Type: text/plain, Size: 5251 bytes --]

On Tue, Nov 6, 2018 at 1:40 AM Grant Taylor via TUHS <tuhs@minnie.tuhs.org>
wrote:

> On 11/05/2018 03:34 PM, Dan Cross wrote:
> [snip]
> > Security, in general, usually seeks to address five questions:
> >
> > 1. Authentication - Is some entity who it claims to be?
> > 2. Authorization - Is some entity allowed to perform some action?
> > 3. Privacy - Can a third party snoop on a private conversation between
> > two entities?
> > 4. Integrity - Can a third party alter communications between two
> > entities in an undetectable way?
> > 5. Non-repudiation - Can it be definitively shown that some entity was a
> > party to some communication?
>
> The 3rd A that I'm used to is "Access Control".  Is the requested action
> allowed given the above information.
>

Isn't that authorization?

> Kerberos is a authentication protocol.
> >
> > LDAP, YP (retroactively named NIS after a lawsuit involving, I believe,
> > British Telecomm), NIS+, NetInfo, Active Directory, and Hesiod are all
> > examples of directory services. To a first-order approximation, one
> > might think of a directory service as providing an oracle allowing one
> > to discover what entities exist in some domain.
> >
> > Authentication protocols and directory services solve different
> > problems. Though in true Micro$oft-of-old fashion, AD sort of merged
> both.
>
> I would argue that a directory including shadow information (like
> NIS(+)) does both too.
>

Not really. It provides the data that lets one perform a relatively weak
validation of e.g. a password, but it is not *itself* an authentication
protocol.

> Kerberos solves the authentication problem, but does not provide a
> > directory service nor does it solve the authorization problem (though
> > some "kerberized" services could use a library to consult a
> > user-provided file of ACLs mapping principals to privileges). On Unix,
> > "authorization data" includes things like your UID and the set of groups
> > you belong to (or more precisely, your process's UIDs and GIDs/groups).
> > Kerberos provided support for privacy via encryption libraries, and it
> > provided support for integrity via hashing/checksumming/signature
> > libraries. "Kerberized" versions of network services such as telnet,
> > FTP, rsh/rlogin/rcp etc all provided support for authentication via the
> > baseline Kerberos protocol as well as privacy and integrity via
> > connection-level encryption and checksumming.
>
> I was not aware that Kerberos could provide privacy (encryption) for
> kerberized services.  I (naively) thought that Kerberos was
> authentication that other things could use to make access control
> decisions.
>

Older versions of Kerberos often included modified versions of popular
servers and their clients that had been modified to use the kerberos
protocol for authentication, and also often to encrypt communications. For
example, the version of `telnet` that shipped with MIT kerberos back in the
day had an option that could be used to encrypt the data stream; similarly
with rlogin, et al. I have a dim memory that the version of FTP might
support encryption for the control connection but not data connections (but
I also might be purely imagining that). I'm guessing most of this stuff has
been dropped from more recent distributions because...really...telnet?

[snip]
> > In its pure form, SSH provides support for limited authentication (via
> > public key cryptography and the wide distribution of public keys) and
> > limited authorization (via the `authorized_keys` file), privacy and
> > integrity.
>
> I think that OpenSSH's certificate support extends that a bit.
>

What I meant is that SSH supports a limited sense of checking whether a
given key matches and making a yea or nay decision based on that.

[snip]
> Even if communications with the NIS server was encrypted, I'm not
> hearing anything that prevents an authenticated user from enumerating
> NIS.  Even if it was over encrypted channels.
>

Correct. `ypcat passwd` often gave you a bunch of hashed passwords in field
two of a stream 7th Edition /etc/passwd formatted entries.

I have, again, some vague memory that at some point this was changed so
that root on the localhost could get a shadow-style map, but normal users
couldn't see the password hashes. But I might totally be making that up,
and of course, it wasn't robust security since what went over the wire
wasn't encrypted and breaking root on a host could still get you all the
hashes on the network. Contrast with Kerberos, where breaking root on a
host doesn't compromise much beyond that host (modulo leveraging that to
steal user passwords and the like).

[snip]
> > Hesiod, which seems unique to Athena, was kind of neat; it piggy-backed
> > the need for a directory service on DNS, which is already a distributed
> > directory service. You embedded relevant data into DNS TXT records, so
> > imagine doing a DNS query to look up a user's /etc/passwd entry: after
> > all, DNS already scaled and was well-proven Internet-wide. I don't know
> > that anyone ever really supported it, though.
>
> I know that Red Hat Linux did have support for it.  One of my colleagues
> was a Hesiod maintainer for a while.
>

Ha! That's a hoot.

[snip]

        - Dan C.

[-- Attachment #2: Type: text/html, Size: 6814 bytes --]

  parent reply	other threads:[~2018-11-07  0:15 UTC|newest]

Thread overview: 64+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-11-04 20:51 Grant Taylor via TUHS
2018-11-04 21:46 ` Ben Greenfield via TUHS
2018-11-04 22:45 ` Arthur Krewat
2018-11-04 22:58 ` Mantas Mikulėnas
2018-11-04 23:49   ` Warner Losh
2018-11-05  3:16 ` Robert Brockway
2018-11-05  6:08   ` Grant Taylor via TUHS
2018-11-05  7:24     ` Mantas Mikulėnas
2018-11-05  7:33       ` Mantas Mikulėnas
2018-11-05 16:12       ` Arthur Krewat
2018-11-05 19:32         ` Grant Taylor via TUHS
2018-11-05 22:43           ` Arthur Krewat
2018-11-06  5:25             ` Grant Taylor via TUHS
2018-11-06 16:50               ` Arthur Krewat
2018-11-06 19:43                 ` Grant Taylor via TUHS
2018-11-05 19:27       ` Grant Taylor via TUHS
2018-11-05 19:36       ` Grant Taylor via TUHS
2018-11-05 21:36         ` Mantas Mikulėnas
2018-11-05 23:12           ` Grant Taylor via TUHS
2018-11-05 21:43         ` Ben Greenfield via TUHS
2018-11-06  4:58           ` Grant Taylor via TUHS
2018-11-06 12:59             ` Ben Greenfield via TUHS
2018-11-06  6:53           ` Mantas Mikulėnas
2018-11-06 13:21             ` Ben Greenfield via TUHS
2018-11-06 13:44               ` Mantas Mikulėnas
2018-11-06 14:00                 ` Ben Greenfield via TUHS
2018-11-06 13:46               ` Mantas Mikulėnas
2018-11-05 22:34         ` Dan Cross
2018-11-06  5:24           ` Grant Taylor via TUHS
2018-11-06  7:07             ` Mantas Mikulėnas
2018-11-06 17:30               ` Grant Taylor via TUHS
2018-11-06 19:58                 ` Mantas Mikulėnas
2018-11-06 22:24             ` Dan Cross [this message]
2018-11-07  0:35               ` Grant Taylor via TUHS
2018-11-07 11:37                 ` Pete Turnbull
2018-11-07 17:30                   ` Grant Taylor via TUHS
2018-11-07 22:01                     ` Dave Horsfall
2018-11-08  1:48                       ` Dave Horsfall
2018-11-07 23:00                     ` Pete Turnbull
2018-11-07  1:03             ` Pete Turnbull
2018-11-06 12:54           ` Ben Greenfield via TUHS
2018-11-05 20:10     ` Dave Horsfall
2018-11-05  3:49 ` Larry McVoy
2018-11-05  6:12   ` Grant Taylor via TUHS
2018-11-05 19:58     ` Dave Horsfall
2018-11-05 22:53       ` Grant Taylor via TUHS
2018-11-06  1:28         ` Dave Horsfall
2018-11-05 15:44   ` Larry McVoy
2018-11-05 18:38     ` arnold
2018-11-05 19:04       ` Larry McVoy
2018-11-05 21:21         ` Noel Hunt
2018-11-07  8:58         ` arnold
2018-11-07 14:05           ` arnold
2018-11-05 20:48 ` A. P. Garcia
2018-11-05 23:07   ` Grant Taylor via TUHS
2018-11-06  1:46     ` Dan Cross
2018-11-06  5:32       ` Grant Taylor via TUHS
2018-11-06 22:29         ` Dan Cross
2018-11-07  0:40           ` Grant Taylor via TUHS
2018-11-07  1:38           ` Arthur Krewat
2018-11-06  3:03     ` Robert Brockway
2018-11-06  5:03       ` David Arnold
2018-11-06  5:34       ` Grant Taylor via TUHS
2018-11-06 23:59 Norman Wilson

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to='CAEoi9W7mJD2y29KPj1av_Lpnpd=AYgLwL-G7HjKYjo-B69ejHA@mail.gmail.com' \
    --to=crossd@gmail.com \
    --cc=gtaylor@tnetconsulting.net \
    --cc=tuhs@minnie.tuhs.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).