Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 25 Mar 1999 01:05:58 -0800 (PST)
From:      Matthew Dillon <dillon@apollo.backplane.com>
To:        Mike Thompson <miket@dnai.com>
Cc:        Gary Gaskell <gaskell@isrc.qut.edu.au>, freebsd-security@FreeBSD.ORG
Subject:   Re: Kerberos vs SSH
Message-ID:  <199903250905.BAA95946@apollo.backplane.com>
References:  <199903250426.UAA68023@apollo.backplane.com> <4.1.19990324234311.00a0eba0@mail.dnai.com>

next in thread | previous in thread | raw e-mail | index | archive | help

:The general concensus seems to be that rsh and like tools can be easily
:hacked, kerberos or no kerberos.
:
:Thanks again,

    Well, for rsh or telnet configured for kerberos-only operation, it's
    reasonably safe.  The one problem with this is that kerberos defaults
    to disabling encryption ... you have to explicitly enable it.

    In general, the biggest security hole with standard tools such as ftp,
    rsh, telnet, and rlogin ( non-kerberos ) is that they pass plaintext
    and both initial passwords and passwords passed later on are vulnerable 
    to interception.  With kerberos and no encryption by default, these tools
    are still vulnerable.  You can get into the account just fine without 
    exposing a password, but once in the account if you need to type a
    password of any sort in to do something else, *that* password is
    vulnerable to interception.

					-Matt
					Matthew Dillon 
					<dillon@backplane.com>


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199903250905.BAA95946>