mod_auth_kerb+ apacahe+kerberos
Russ Allbery
rra at stanford.edu
Mon Jun 30 18:15:47 EDT 2008
"Henry B. Hotz" <hotz at jpl.nasa.gov> writes:
> On Jun 30, 2008, at 9:07 AM, krbdev-request at mit.edu wrote:
>> to answer your question: for apache auth_mod_krb SSL is recomended,
>> however not necessary. the fact is, it would work without it, but it's
>> definitely something you do not want to do. without SSL your kerberos
>> passwords will fly to the web server in cleartext (yes) and therefore
>> totally compromise your kerberos infrastructure (all your kerberized
>> services use the same useraname/password yes?)
> No, it's not remotely that bad.
> In fact your passwords don't go over that link (or any other) at all
> with Kerberos. It's just Kerberos tickets with short (~1 day at most)
> lifetimes. The main issue is that the ticket could be sniffed and re-
> used to let someone else access the same web server.
This is only true if you enable negotiate-auth. The default in
mod_auth_kerb is to do basic auth and verify the password on the server,
which does have the behavior described by the previous poster.
--
Russ Allbery (rra at stanford.edu) <http://www.eyrie.org/~eagle/>
More information about the krbdev
mailing list