On Fri, 7 Jun 2002 [EMAIL PROTECTED] wrote:

> In the past, some people have suggested just copying the
> servers /etc/passwd file to /opt/ltsp/i386/etc, but I can
> tell you very clearly that will NEVER be part of a
> standard LTSP package.

Beyond the obvious 'least privilege argument' in not releasing
/etc/shadow across plain text NFS, (where the crypt lives),
did you have other issues in mind? -- a certificate based ssl
or keyed ssh-tunnelled, tcp based NFS for /etc and for swap
(to avoid plucking plaintext passphrases and so on) seem both
urgent, and to solve the issue.
 
> Creating a special-purpose daemon to handle this, in my
> opinion, is just reinventing the wheel.  Use what is already
> there, and spend your time solving other more important
> problems.

ummm. If not LDAP authorization bits, how about - Radius for
individual user auth?  Most applications in Linux and
certainly in Red Hat which require authentication are
PAM-ified, and a Radius plug in exists.
 
> But, I also invite you to challenge me on this.  Maybe you've
> got a better way.

> > server on all workstations.  It could also be done by
> > creating a special-purpose daemon just for this task.  Then
> > we could implement our own style of security measures in
> > the controlling daemon.

or push the PUBLIC keychain authorised_keys, etc of root
around to all hosts, and retain the private key on the servers 
-- locked with passphrase as desired, and with ssh-agent 
running to hold the unlock rights.

-- Russ Herrold



_______________________________________________________________

Don't miss the 2002 Sprint PCS Application Developer's Conference
August 25-28 in Las Vegas - 
http://devcon.sprintpcs.com/adp/index.cfm?source=osdntextlink

_____________________________________________________________________
Ltsp-discuss mailing list.   To un-subscribe, or change prefs, goto:
      https://lists.sourceforge.net/lists/listinfo/ltsp-discuss
For additional LTSP help,   try #ltsp channel on irc.openprojects.net

Reply via email to