英語 [README] [login/README.WZV] [skey.access]
日本語 [login/README.WZV.j] [skey.access.j]
[logdaemon-5.6をNEWS OS4.xでコンパイルするためのパッチ] [戻る]
NAME
skey.access - S/Key password control table
DESCRIPTION
The S/Key password control table (/etc/skey.access) is used
by login-like programs to determine when UNIX passwords may
be used to access the system.
+ When the table does not exist, there are no password
restrictions. The user may enter the UNIX password or
the S/Key one.
+ When the table does exist, UNIX passwords are permitted
only when explicitly specified.
+ For the sake of sanity, UNIX passwords are always per-
mitted on the systems console.
TABLE FORMAT
The format of the table is one rule per line. Rules are
matched in order. The search terminates when the first
matching rule is found, or when the end of the table is
reached.
Rules have the form:
permit condition condition...
deny condition condition...
where permit and deny may be followed by zero or more condi-
tions. Comments begin with a `#' character, and extend
through the end of the line. Empty lines or lines with only
comments are ignored.
A rule is matched when all conditions are satisfied. A rule
without conditions is always satisfied. For example, the
last entry could be a line with just the word deny on it.
CONDITIONS
hostname wzv.win.tue.nl
True when the login comes from host wzv.win.tue.nl.
See the WARNINGS section below.
internet 131.155.210.0 255.255.255.0
True when the remote host has an internet address in
network 131.155.210. The general form of a net/mask
rule is:
internet net mask
The expression is true when the host has an internet
address for which the bitwise and of address and mask
Sun Release 4.1 Last change: 1
SKEY.ACCESS(5) FILE FORMATS SKEY.ACCESS(5)
equals net. See the WARNINGS section below.
port ttya
True when the login terminal is equal to /dev/ttya.
Remember that UNIX passwords are always permitted with
logins on the system console.
user uucp
True when the user attempts to log in as uucp.
group wheel
True when the user's primary group is wheel, or when
the user is explicitly listed in the group file under
the wheel group.
COMPATIBILITY
For the sake of backwards compatibility, the internet key-
word may be omitted from net/mask patterns.
WARNINGS
Several rule types depend on host name or address informa-
tion obtained through the network. What follows is a list
of conceivable attacks to force the system to permit UNIX
passwords.
Host address spoofing (source routing)
An intruder configures a local interface to an address
in a trusted network and connects to the victim using
that source address. Given the wrong client address,
the victim draws the wrong conclusion from rules based
on host addresses or from rules based on host names
derived from addresses.
Remedies: (1) do not permit UNIX passwords with net-
work logins; (2) use network software that discards
source routing information (e.g. a tcp wrapper).
Almost every network server must look up the client host
name using the client network address. The next obvious
attack therefore is:
Host name spoofing (bad PTR record)
An intruder manipulates the name server system so that
the client network address resolves to the name of a
trusted host. Given the wrong host name, the victim
draws the wrong conclusion from rules based on host
names, or from rules based on addresses derived from
host names.
Remedies: (1) do not permit UNIX passwords with network
logins; (2) use network software that verifies that the
hostname resolves to the client network address (e.g. a
Sun Release 4.1 Last change: 2
SKEY.ACCESS(5) FILE FORMATS SKEY.ACCESS(5)
tcp wrapper).
Some applications, such as the UNIX login program, must look
up the client network address using the client host name. In
addition to the previous two attacks, this opens up yet
another possibility:
Host address spoofing (extra A record)
An intruder manipulates the name server system so that
the client host name (also) resolves to a trusted
address.
Remedies: (1) do not permit UNIX passwords with net-
work logins; (2) the skeyaccess() routines ignore net-
work addresses that appear to belong to someone else.
DIAGNOSTICS
Syntax errors are reported to the syslogd. When an error is
found the rule is skipped.
FILES
/etc/skey.access, password control table
AUTHOR
Wietse Venema
Eindhoven University of Technology
The Netherlands