Bastian Blank <[EMAIL PROTECTED]> writes:

> krb5kdc should be able to reduce its own priviledges by using
> setuid/setgid to a different user after binding the ports. krb5kdc does
> not support to be reconfigured on runtime anyway, so it IMHO don't need
> root priviledges for working.
>
> kadmind needs to use the same user then and the db needs to be owned by
> this.

I'll file this upstream, but I expect that from an upstream perspective it
will be a low priority.  For most sites, the Kerberos database itself is
more valuable than root on a given system and any compromise of the KDC or
kadmind would provide ways to gain root not only on the KDC but on many
other systems.  So in many cases this doesn't provide a lot of additional
security at a theoretical level.

This is not to say that it's a bad idea.  It's an entirely reasonable idea
and would provide a lot of protection against unsophisticated attackers
who are just after root on a system and don't have the resources or
knowledge to make use of access to the KDC database.  I just wanted to let
you know why I don't anticipate very quick action on this.

I expect that upstream would welcome a patch, though, if you (or anyone
else) has time to develop one.

-- 
Russ Allbery ([EMAIL PROTECTED])               <http://www.eyrie.org/~eagle/>



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to