Date: Wed, 11 Nov 2015 18:28:10 -0500 (EST) From: Benjamin Kaduk <kaduk@MIT.EDU> To: Daniel Kalchev <daniel@digsys.bg> Cc: "freebsd-current@freebsd.org" <freebsd-current@freebsd.org>, "freebsd-security@freebsd.org" <freebsd-security@freebsd.org> Subject: kereros telnet/rlogin/etc. (was Re: OpenSSH HPN) Message-ID: <alpine.GSO.1.10.1511111816590.26829@multics.mit.edu> In-Reply-To: <546376BD-A2E7-4B73-904E-4F33DD82401E@digsys.bg> References: <86io5a9ome.fsf@desk.des.no> <20151110175216.GN65715@funkthat.com> <56428C84.8050600@FreeBSD.org> <CAOc73CAHQ0FRPES7GrM6ckkWfgZCS3Se7GFUrDO4pR_EMVSvZQ@mail.gmail.com> <20151111075930.GR65715@funkthat.com> <CAA=KUhs9g9gajxwLFBgn2nNhnn4oQSZ56FRVC%2BPde4ZZO=g7Ug@mail.gmail.com> <546376BD-A2E7-4B73-904E-4F33DD82401E@digsys.bg>
next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, 11 Nov 2015, Daniel Kalchev wrote: > > Perhaps similar level of security could be achieved by =E2=80=9Cthe old t= ools=E2=80=9D > if they were by default compiled with Kerberos. Although, this still > requires building additional infrastructure. The kerberized versions of the old tools are basically unsupported upstream at this point. Telnet is actively insecure, being limited to single-DES; rlogin may be somewhat better but it's still not looking very good. ssh is better because it speaks GSS-API instead of raw kerberos, and can thus keeps up with newer crypto automatically. When I was working at MIT, I considered making a final release of the krb5-appl distribution, so as to include in the release announcement that they were not going to be supported further, but could not even bring myself to do that. They are not in Debian anymore, and I expect them to dwindle from other distributions, too. Let the "old tools" grow old and retire. -Ben From owner-freebsd-security@freebsd.org Wed Nov 11 23:48:36 2015 Return-Path: <owner-freebsd-security@freebsd.org> Delivered-To: freebsd-security@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 50545A2C3B9 for <freebsd-security@mailman.ysv.freebsd.org>; Wed, 11 Nov 2015 23:48:36 +0000 (UTC) (envelope-from bilbo@hobbiton.org) Received: from mail-wm0-x236.google.com (mail-wm0-x236.google.com [IPv6:2a00:1450:400c:c09::236]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id DB40B10FA for <freebsd-security@freebsd.org>; Wed, 11 Nov 2015 23:48:35 +0000 (UTC) (envelope-from bilbo@hobbiton.org) Received: by wmdw130 with SMTP id w130so133195231wmd.0 for <freebsd-security@freebsd.org>; Wed, 11 Nov 2015 15:48:34 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hobbiton_org.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type; bh=0tuAvlkZYjOvtSv/6UaY636uzA2vY6XgvZ/LF3w2LI0=; b=rLwF1PUBUUMCATxsQhftQUKKlwk7TzrdCh+wWL1We2/i/jF/ISm3wjDNYCzn87xpiV i1+iSUDak3vvJWbfyjq3CtftI9BXkgS9VFeaidnX92Oc6n88pZeTD6/LQzKDYAB62VSh ra74MdayLYWVvmuGTlO8lmReKQYk0cAFeJZDLkfQX6ANF4bm+GL4SKD7dhcrg2k01Nps QHi/gLbuxLSbKJC0QvVafBIc3gTFFT5nbxXeCRzTQ2tYaJ+buI1aJRf71UJU6ffiwSiE 8ZtayXMFFOts6RdA+OlHEQMdQVHOf1nuXDZr9w4gTNmeHcf/LVfjQ/p46HYZtzSyfSKd GUAw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-type; bh=0tuAvlkZYjOvtSv/6UaY636uzA2vY6XgvZ/LF3w2LI0=; b=EeXPcoaJbfZghkzhOO77ZCB+naXbvudEl1GLmsQDNIk/dYO4ohlMkWz81jF9hxncjB x6s/cXyjcStvOt0h72XqIDlj/gXBXFlQsA/4m3RqWMgQCaEMU4eW4oLqlFODxd1Cm3rV rSRW7EE3NZIB0P3kS/IZO0/qN4/7M3hU9I6+2BvLYqyK0shWrbYLXUiK31i+8k1V71YO 1Wi4PkGiK8ozTz3oWPw77DPwuCieawmgDEuRAcmVULsrJ1PMPH0iHNK5byvViUNcDb7b yL+Nm90OLrDBY3Qn4YDtxD3/f7IKBcdhJHex8NERap5O/PictHvvoeYocOZO3guj0zeS q+lg== X-Gm-Message-State: ALoCoQlNRojcCeBj6iuhgJvGGhtaKHIgKuUrff+onAKAlO21EU4WbRPdngUDmXmkY7FRbwRiBW7U X-Received: by 10.28.137.211 with SMTP id l202mr14487997wmd.90.1447285714028; Wed, 11 Nov 2015 15:48:34 -0800 (PST) MIME-Version: 1.0 Received: by 10.28.100.134 with HTTP; Wed, 11 Nov 2015 15:47:54 -0800 (PST) X-Originating-IP: [96.3.203.123] In-Reply-To: <CA+QLa9DD7PQm0Rsvn3D75+bJU_GgJxYbHHvd6Qsr5ky_C3WQqw@mail.gmail.com> References: <86io5a9ome.fsf@desk.des.no> <20151110175216.GN65715@funkthat.com> <56428C84.8050600@FreeBSD.org> <20151111014102.GQ65715@funkthat.com> <CA+QLa9DD7PQm0Rsvn3D75+bJU_GgJxYbHHvd6Qsr5ky_C3WQqw@mail.gmail.com> From: Leif Pedersen <bilbo@hobbiton.org> Date: Wed, 11 Nov 2015 17:47:54 -0600 Message-ID: <CAK-wPOh+NFMbh7HdYtVJYk9sPKAsaT_gqhCr2AC6FUQWcGJzhA@mail.gmail.com> Subject: Re: OpenSSH HPN To: Robert Simmons <rsimmons0@gmail.com> Cc: "freebsd-security@freebsd.org" <freebsd-security@freebsd.org> Content-Type: text/plain; charset=UTF-8 X-Content-Filtered-By: Mailman/MimeDel 2.1.20 X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Security issues \[members-only posting\]" <freebsd-security.freebsd.org> List-Unsubscribe: <https://lists.freebsd.org/mailman/options/freebsd-security>, <mailto:freebsd-security-request@freebsd.org?subject=unsubscribe> List-Archive: <http://lists.freebsd.org/pipermail/freebsd-security/> List-Post: <mailto:freebsd-security@freebsd.org> List-Help: <mailto:freebsd-security-request@freebsd.org?subject=help> List-Subscribe: <https://lists.freebsd.org/mailman/listinfo/freebsd-security>, <mailto:freebsd-security-request@freebsd.org?subject=subscribe> X-List-Received-Date: Wed, 11 Nov 2015 23:48:36 -0000 On Wed, Nov 11, 2015 at 4:29 PM, Robert Simmons <rsimmons0@gmail.com> wrote: > I don't think there is such a thing as a trusted network. That is a unicorn > these days. > > No networks should be considered trusted. > oh baloney. That's just a clever way to say you want to stop thinking about trust. If I've connected two machines directly, that network is more trustworthy than any encryption. This is not rare, but typical for system recovery, which is where nc and ssh with the none cipher are highly useful. It's also not a bridge too far to claim a network is trusted when it has 1000 computers on a special-purpose processing network with access only allowed by the admins that built it, and perhaps an API. In those networks, the nodes work together like storage and CPUs work together in a single computer. The only difference is that SATA disks and x86 CPUs are replaced by general-purpose computers running Cassandra and Nginx, connected by ethernet, so that you can connect thousands together instead of dozens. Do you always insist on encryption on your SATA cables and memory buses? That sort of special-purpose network is not rare either; rather it's typical for internet services where the load is beyond what a single machine can handle, or clusters that run models that are too large for a single machine. Trustworthy networks do exist. They just aren't the same networks as 20 years ago. -- As implied by email protocols, the information in this message is not confidential. Any middle-man or recipient may inspect, modify, copy, forward, reply to, delete, or filter email for any purpose unless said parties are otherwise obligated. As the sender, I acknowledge that I have a lower expectation of the control and privacy of this message than I would a post-card. Further, nothing in this message is legally binding without cryptographic evidence of its integrity. http://bilbo.hobbiton.org/wiki/Eat_My_Sig
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?alpine.GSO.1.10.1511111816590.26829>