[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Running kdc as unprivileged user
--On måndag, måndag 6 nov 2006 23.36.56 -0800 Yury Arkady Sobolev
<yury@OCF.Berkeley.EDU> wrote:
> Can the Kerberos daemons (kdc, kadmin) be run as an unprivileged user? I
> do not see why not, but I have not found anyone doing this.
I see two ways to get around the port binding issue without coding:
* Use an operating system with enhanced privilege granularity, like Solaris
10, and give appropriate permissions to the user, like "net_privaddr" in
the S10 example.
* Tell the kdc to listen on an unprivileged port, and point your clients to
it with proper SRV records:
_kerberos._udp.namn.se 3600 SRV 10 10 4711 unprivkdc.namn.se.
Both methods have issues; do you want the kdc on Sol10, and can your
clients find the kdc through DNS?
Having written so much, I do not find running the kdc as root is a very big
issue. The kdc must be secure beyond comprehension anyways...
--
MÃ¥ns Nilsson Systems Specialist
+46 70 681 7204 cell KTHNOC
+46 8 790 6518 office MN1334-RIPE
Half a mind is a terrible thing to waste!
PGP signature