A Debian user requested that krb5kdc and kadmind support dropping
privileges after binding to network ports and run as a non-root user
with access to the KDC database. This isn't particularly compelling for
sites where the KDC holds the keys to everything anyway, but if one is
using a KDC for a guest realm, for a specific purpose, or in some other
more limited situation, this provides some additional security
protection.  It also provides some protection against unsophisticated
attackers who know how to use a root exploit but who don't have the
resources or knowledge to make use of access to the KDC database.

See http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=477309 for the
original report.

True, after binding ports we may not need privileges. Note, too, though, that with SRV records or config file specs you can specify a non-privileged port for clients to talk to, and run the KDC programs entirely without privileges. That's how we do our basic testing.

Unfortunately, I've heard that Microsoft clients ignore the port number indicated in SRV records and always use port 88, so if Windows clients are an issue, it could be a problem. A firewall config on the KDC that redirects UDP port 88 to whatever non-privileged port could help with that, too, though it's kind of an ugly workaround. And if anyone puts a port-88 hole in their company firewall for Kerberos, it may still block Kerberos traffic to another randomly chosen port.

(And yes, I agree with Russ's assessment in his message in the Debian tracking system, that it's probably going to be low-priority for us, but a good patch would be welcome.)

--
Ken Raeburn, Senior Programmer
MIT Kerberos Consortium



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to