AFS access permissions and OSX interaction

Henry B. Hotz hotz at jpl.nasa.gov
Thu Aug 21 01:44:50 CEST 2003


At 2:14 PM -0500 8/20/03, nepywoda at fnal.gov wrote:
>----- Original Message -----
>From: "Henry B. Hotz" <hotz at jpl.nasa.gov>
>Date: Wednesday, August 20, 2003 1:48 pm
>Subject: Re: AFS access permissions and OSX interaction
>>  If two (different?) users have the same UID then the OS thinks they
>>  are the same user and they can hack each other to bits.  They still
>>  can't touch anyone else with different UIDs.  This is just Unix,
>>  it's
>>  got nothing to do with AFS.  In fact I generally have a toor
>>  account
>>  defined on my machines with UID 0 so I can get root access with the
>>  shell I want.
>>
>>  My point is that if you have two different users with the same UID
>>  then they share the same AFS tokens (in addition to all other
>>  permissions) unless they are in different PAGs.  Kerberos 5 will
>>  try
>>  to associate tickets with login sessions, but the user can still go
>>  get the other session's ticket if he wants (except on MacOS X).
>>
>>  I'm guessing, but I think the intent of the original question was
>>  could you just create a local group account and hand it out?  Each
>>  actual user would then klog to his actual AFS account and go from
>>  there.  The answer is that this is a "bad idea" (TM).
>>
>>  If, on the other hand, each user has a different UID which has no
>>  relation to the AFS UID then you're fine.  The only problem is
>>  confusion.  You don't even have a problem if a local UID happens to
>  > match up with an AFS UID.
>
>I think I forgot to mention that I didn't mean joe and fred both 
>have UID say 501 on the SAME machine....just that 501 is the default 
>UID for OSX. So if Joe is on machine 1 and Fred is on machine 2, 
>both have local (to their computer) UIDs of 501. Certainly if they 
>were on the same machine with the same UID there would be problems. 
>I'm talking about 2 different machines. I assume that a token not 
>only binds to a UID, but also to a computer/IP address/PAG.

The kernel tracks the token by UID (or by PAG if PAG is implemented). 
Given full Kerberos then the ticket is tied to the machine/IP unless 
it's an addressless ticket or specifically forwarded.

>Sorry about the confusion.

No problem.  ;-)
-- 
The opinions expressed in this message are mine,
not those of Caltech, JPL, NASA, or the US Government.
Henry.B.Hotz at jpl.nasa.gov, or hbhotz at oxy.edu





More information about the Arla-drinkers mailing list