I am continuing (sorry) my old 2016 thread (part of it below) about trying to 
kprop through a NAT. 

I have some secondary KDCs in a different network than the primary, with a NAT 
in the way, and was having trouble getting kprop to work (it doesn't like the 
mismatch between the IP from the hostname dns lookup and the IP in the 
getsockname(), or something like that). 

I wound up working around it by periodically dumping the database, copying it 
over to the secondaries, and importing it.
But this workaround is causing some other trouble (the master database is 
locked for a noticeable amount of time during the periodic exports). 

Can you tell me if there has already been, or if there might be in the near 
future, a plan to update kprop to let it work (maybe with a command line switch 
or something) through the NAT, so that I can do incremental propagation through 
the NAT?

Or, maybe there is some way that I can fake out the name resolution (using 
/etc/hosts or dnsmasq or something) to make it work -- is that a reasonable 
thing to try?

Or, one of my co-workers suggested that I make a cron job to scan for recent 
password changes and dump/import just those, periodically (instead of doing the 
full database dumps). I can do that and I guess it would work... but it would 
be nice to not do that.

Or is there some better idea that we didn't think of?

Thank you again for your help,
Jerry


-----Original Message-----
From: Greg Hudson <ghud...@mit.edu>
Date: Thursday, December 24, 2015 at 12:21 AM
To: "Jeremiah E. Shipman" <je...@cornell.edu>, "kerberos@mit.edu" 
<kerberos@mit.edu>
Subject: Re: kprop with multiple or NATted IP address

On 12/23/2015 03:50 PM, Jerry Shipman wrote:
> Is there a way to do what I’m trying to do?
> Or, is there a reason that it is dangerous to avoid verifying that IP match, 
> and I shouldn’t try to work around it?

The only really useful purpose of checking addresses is preventing
reflection attacks, where an attacker takes a KRB-PRIV or KRB-SAFE
message from one of the parties and send it back to them as if it came
from the other party.  Many protocols aren't susceptible to reflection
attacks because they don't use similar formats for requests and
responses.  After verifying that the kprop protocol isn't vulnerable, we
could probably make changes similar to the ones we made to kpasswd to
allow it to work over NATs.

(Protocols using GSS don't have this problem because GSS tokens only use
direction bits, not addresses.  Well, unless they use IP address channel
bindings, which isn't common.)


________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to