Hello,

> I sometimes hears than kerberos 5 security is lowered by the use of file 
> based credentials, whereas kerberos 4 was using shared memory instead, 
> making much more difficult to an admin (for instance) to retrieve a 
> valid user ticket.

kth-krb never had shared memory credentials, dunno about MIT Kerberos.

> I know an admin user can scan the memory for a user ticket, but a quick 
> google search on the issue didn't returned any such tool ready for user. 
> And unless some string pattern make easy to grep /proc/kcore for 
> extracting those ticket, is this assertion reserved to admins able to 
> craft a dedicated memory scanning tool ?
> 
> Also, I've read than kerberos 5 specification doesn't enforce one or the 
> other kind of storage, that's just MIT and heimdal implementation 
> choices. Are they any way, for both of them, to use memory-based 
> credential cache instead ?

Heimdal also supports kcm, which is a credential cache server. That brings 
credentials into memory, but that is probably not so exciting. Currently its 
most like a ffile like interface between libkrb5 and kcm.

Eventually it will support doing krb5_mk_req() in the process so the keys never 
will leave kcm.

Love



________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to