[OpenAFS] packet sniffing and file content
Sam Hartman
hartmans@mekinok.com
17 Jul 2001 09:05:31 -0400
>>>>> "aeneous" == aeneous <aeneous@speakeasy.org> writes:
>> But the use of fcrypt is not limited to the kaserver. It is
>> also used by the ptserver, update (used to transfer key files
>> between the SCM and other fileservers), for communication
>> between the fileserver and the ptserver (for name to id
>> mappings and to lookup group memberships), and between admin
>> utilites (pts, kas, & bos) and the corresponding servers. If
>> AFS servers are distributed across an unsecured network, there
>> is lots of opportunity for mischief perpetrated by an attacker
>> with access to a (hypothetical) high-speed fcrypt cracker.
aeneous> How hard would it be for them to use a VPN for their Ubik
aeneous> servers? For instance, CIPE or IPSec-based.
No harder than setting up Ipsec in the first place. But really long
term you want some sort of real application-level security
architecture. But if you need to put kaservers at different physical
locations, Ipsec seems like a way to go.
aeneous> Public addresses in /usr/vice/etc/CellServDB on clients,
aeneous> private VPN addresses in /usr/afs/etc/CellServDB on Ubik
aeneous> servers. VOTE_GetSyncSite wouldn't be useful.
Use public addresses for everything and correctly configure your
policy engine to use a tunnel between the DB servers.