git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@4050 ec53bebd-3082-4978-b11e-865c3cabbd6b
This commit is contained in:
Johan Danielsson
1997-11-20 03:13:06 +00:00
parent 7bff6e2028
commit c43b68aebc
2 changed files with 100 additions and 22 deletions

View File

@@ -77,6 +77,44 @@ KDC: the Kerberos Key Distribution Center
Kerberised server: the server using Kerberos to authenticate the Kerberised server: the server using Kerberos to authenticate the
client, for example telnetd. client, for example telnetd.
.ti 0
Firewalls
There are different kinds of firewalls. The main difference is in the
way it forwards your packets. The easiest types of firewall are the
ones that just imposes restrictions on incoming packets. Such a
firewall could be described as a router that just throws away packets
that match some criteria. They may also ``hide'' some or all addresses
on the inside of the firewall, replacing the addresses in the outgoing
packets with the address of the firewall (aka network address
translation, or NAT). NAT can also be used without any packet
filtering, for instance when you have more than one host sharing a
single dialed-in PPP connection.
There are also firewalls that does NAT both on the inside and the
outside (a server on the inside will see this as a connection from the
firewall).
A third type is the proxy type firewall, that parses the contents of
the packets, basically acting as a server to the client, and as a
client to the server. If Kerberos is to be used with this kind of
firewall, a protocol module that handles KDC requests has to be
written.
This type of firewall also might add extra trouble when used with
kerberised versions of protocols that the proxy understands, in
addition to the ones mentioned below.
This is the case with the FTP Security Extensions [RFC2228], that adds
a new set of commands to the FTP protocol [RFC959], for integrity,
confidentiality and privacy protecting commands. When transferring
data, the FTP protocol uses a separate data channel, and an FTP proxy
will have to look out for commands that start a data transfer. If all
commands are encrypted, this is impossible.
An example of a protocol that doesn't suffer from this is TELNET that
does all authentication and encryption in-bound.
.ti 0 .ti 0
Scenarios Scenarios
@@ -95,22 +133,18 @@ communicate over TCP.
Apart from that, the client needs to be sure that the ticket it will Apart from that, the client needs to be sure that the ticket it will
acquire from the KDC can be used to authenticate to a server outside acquire from the KDC can be used to authenticate to a server outside
its firewall. For this, it needs to add the address(es) of potential its firewall. For this, it needs to add the address(es) of potential
firewalls to the list of its own addresses when requesting the firewalls between itself and the KDC/server, to the list of its own
ticket. We are not aware of any protocol for determining this set of addresses when requesting the ticket. We are not aware of any
addresses, thus this will have to be manually configured in the protocol for determining this set of addresses, thus this will have to
client. be manually configured in the client.
The client could also request a ticket with no addresses, but some
KDCs and servers might not accept such a ticket.
With the ticket in possession, communication with the kerberised With the ticket in possession, communication with the kerberised
server will not need to be any different from communicating between a server will not need to be any different from communicating between a
non-kerberised client and server. non-kerberised client and server.
.ti 1
KDC behind firewall
Once there is some way of getting the requests through the firewall to
the KDC and back to the requesting client there is nothing else that
can go wrong.
.ti 1 .ti 1
Kerberised server behind firewall Kerberised server behind firewall
@@ -123,6 +157,11 @@ address (before its firewall) that the request was sent for. If this
is done via some out-of-band mechanism or it's directly able to see it is done via some out-of-band mechanism or it's directly able to see it
doesn't matter. doesn't matter.
.ti 1
KDC behind firewall
The same restrictions applies for a KDC as for any other server.
.ti 0 .ti 0
Specification Specification

View File

@@ -77,6 +77,44 @@ KDC: the Kerberos Key Distribution Center
Kerberised server: the server using Kerberos to authenticate the Kerberised server: the server using Kerberos to authenticate the
client, for example telnetd. client, for example telnetd.
.ti 0
Firewalls
There are different kinds of firewalls. The main difference is in the
way it forwards your packets. The easiest types of firewall are the
ones that just imposes restrictions on incoming packets. Such a
firewall could be described as a router that just throws away packets
that match some criteria. They may also ``hide'' some or all addresses
on the inside of the firewall, replacing the addresses in the outgoing
packets with the address of the firewall (aka network address
translation, or NAT). NAT can also be used without any packet
filtering, for instance when you have more than one host sharing a
single dialed-in PPP connection.
There are also firewalls that does NAT both on the inside and the
outside (a server on the inside will see this as a connection from the
firewall).
A third type is the proxy type firewall, that parses the contents of
the packets, basically acting as a server to the client, and as a
client to the server. If Kerberos is to be used with this kind of
firewall, a protocol module that handles KDC requests has to be
written.
This type of firewall also might add extra trouble when used with
kerberised versions of protocols that the proxy understands, in
addition to the ones mentioned below.
This is the case with the FTP Security Extensions [RFC2228], that adds
a new set of commands to the FTP protocol [RFC959], for integrity,
confidentiality and privacy protecting commands. When transferring
data, the FTP protocol uses a separate data channel, and an FTP proxy
will have to look out for commands that start a data transfer. If all
commands are encrypted, this is impossible.
An example of a protocol that doesn't suffer from this is TELNET that
does all authentication and encryption in-bound.
.ti 0 .ti 0
Scenarios Scenarios
@@ -95,22 +133,18 @@ communicate over TCP.
Apart from that, the client needs to be sure that the ticket it will Apart from that, the client needs to be sure that the ticket it will
acquire from the KDC can be used to authenticate to a server outside acquire from the KDC can be used to authenticate to a server outside
its firewall. For this, it needs to add the address(es) of potential its firewall. For this, it needs to add the address(es) of potential
firewalls to the list of its own addresses when requesting the firewalls between itself and the KDC/server, to the list of its own
ticket. We are not aware of any protocol for determining this set of addresses when requesting the ticket. We are not aware of any
addresses, thus this will have to be manually configured in the protocol for determining this set of addresses, thus this will have to
client. be manually configured in the client.
The client could also request a ticket with no addresses, but some
KDCs and servers might not accept such a ticket.
With the ticket in possession, communication with the kerberised With the ticket in possession, communication with the kerberised
server will not need to be any different from communicating between a server will not need to be any different from communicating between a
non-kerberised client and server. non-kerberised client and server.
.ti 1
KDC behind firewall
Once there is some way of getting the requests through the firewall to
the KDC and back to the requesting client there is nothing else that
can go wrong.
.ti 1 .ti 1
Kerberised server behind firewall Kerberised server behind firewall
@@ -123,6 +157,11 @@ address (before its firewall) that the request was sent for. If this
is done via some out-of-band mechanism or it's directly able to see it is done via some out-of-band mechanism or it's directly able to see it
doesn't matter. doesn't matter.
.ti 1
KDC behind firewall
The same restrictions applies for a KDC as for any other server.
.ti 0 .ti 0
Specification Specification