Subject: ut oh..
To: None <explorer@NetBSD.ORG>
From: Bill Sommerfeld <sommerfeld@orchard.medford.ma.us>
List: tech-net
Date: 03/22/1996 14:20:37
-----BEGIN PGP SIGNED MESSAGE-----
Modified Files:
commands.c
Log Message:
Fix telnet so that KerberosIV encryption works with CNAMEs:
for ip # based telnets:
get the host name via gethostbyaddr() and use the
name returned. If the call fails, keep
the numeric version and let kerberos fail.
for telnets to CNAMEs:
After the gethostbyname() has returned the correct
ip #, use it as above to get the true
name of the machine.
This is a *bad* idea.
This introduces a vulnerability to name-server based spoofing.
Since the DNS is not secure, I can pollute your cache with a CNAME
pointing at a different kerberos telnet server (either in the same
realm or in a different realm which your realm has exchanged
interrealm keys with), and make you request a secure connection to a
server other than the one you expected to.
This would be especially bad if kerberos4 telnet supported ticket
forwarding (like krb5 telnet does..)
I would strongly suggest that you print the server principal name you
actually end up using if the client pulls this stunt..
- Bill
-----BEGIN PGP SIGNATURE-----
Version: 2.6.1
iQCVAwUBMVK3LLT+rHlVUGpxAQFaWQP/VCHMLhekkD20YVega4sofzh8ZG5El0sh
fcrX+E9NMY4n5OmrQLLFom1ZZYE4Ydln4fzfQm1/cNh3JYOSXymxKjJIsHhNLV4B
g5uSsvxlpUc9IaQA2hYL+6t4H1kMslqj+8WpQ26BROlms1O1kmjWFFcty+Ua6gN6
6abJ64/n3P4=
=dk2r
-----END PGP SIGNATURE-----