Received: from smtp108.sbc.mail.mud.yahoo.com (smtp108.sbc.mail.mud.yahoo.com [68.142.198.207]) by krbdev.mit.edu (8.12.9) with SMTP id l9IN0aHW025214; Thu, 18 Oct 2007 19:00:37 -0400 (EDT) Received: (qmail 5132 invoked from network); 18 Oct 2007 23:00:30 -0000 Received: from unknown (HELO CDCHOME) (chrisclausen@sbcglobal.net@76.199.12.124 with login) by smtp108.sbc.mail.mud.yahoo.com with SMTP; 18 Oct 2007 23:00:30 -0000 X-Ymail-Osg: YYKFZb0VM1lDz56EAKYo_gGmmwdc7CKNAK6uezaAPv4UF6e4AXoBIH.ROB6.HlU5s0Ktaxy0K59a8duT3xgtk9Ho0ashn2Xm54RvHAGyFeYNSjOwztY- Message-ID: <75704771D4A847138BB106A0ED095055@CDCHOME> From: "Christopher D. Clausen" To: References: Subject: Re: [krbdev.mit.edu #5821] REQ: in-registry keytab support Date: Thu, 18 Oct 2007 17:57:28 -0500 X-Priority: 3 X-Msmail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.3790.3959 X-Mimeole: Produced By Microsoft MimeOLE V6.00.3790.4133 X-Rfc2646: Format=Flowed; Original RT-Send-Cc: X-RT-Original-Encoding: iso-8859-1 Content-Length: 1704 Ken Raeburn via RT wrote: > On Oct 18, 2007, at 17:16, Christopher D. Clausen via RT wrote: >> Sam Hartman via RT wrote: > So now your anonymous user would be talking to the attacker's version > of the AFS cell, with encryption. Understood. No less secure than anonymous AFS access right now though, except for maybe the user thinking they are secure. > It may be safer from passive eavesdroppers who don't have the shared > key, but conservatively, it shouldn't be considered any more secure > than non-encrypted exchanges, unless you have good reason to believe > the key can never be compromised. Basically, one would use it purely for over the wire encryption. >> (Say non-AD joined machines. Copying a registry file and >> importing it may be simpler than setting up a file path, etc. A >> single >> registry key can contain all the needed configuration info.) The >> fact that you are actually authenicating but still an anonymous user >> allows for OpenAFS to enable encryption to the cell. The is a >> FEATURE in this >> case. (Well, it will hopefully soon be an OpenAFS feature.) > > A better solution, which unfortunately is still in design, might be > the anonymous-ticket facility for Kerberos, http://www.ietf.org/ > internet-drafts/draft-ietf-krb-wg-anon-04.txt . Yeah, well, sometimes one needs a solution that works now and not at some undetermined point in the future. ----- Regardless, even only using the single instance of a cluster of machines serving HTTP the keytab in the registry is still a useful feature. And allowing the service keytab to be in a registry key doesn't make it any less secure than a file. <