This site requires JavaScript to be enabled
An updated version of this article is available

Strong Authentication and Fermilab Computing Policy Issues

5 views

2.0 - Updated on 2021-02-24 by Carlos Salazar (Inactive)

1.0 - Authored on 2014-05-01 by Fang Wang

Intended for: Kerberos users and system administrators


Scenario/Use case:

This article describes Strong Authentication policy and guidelines.


Instructions:

The full text of the Fermilab Policy on Computing is maintained at http://security.fnal.gov/Policies/cpolicy.html. In this article we summarize the important points as regards Strong Authentication.

The Strong Authentication Policy in a Nutshell

Computers at Fermilab must be configured such that they require Kerberos V5 authentication for login over the network. Our working definition of computer, as regards strong authentication, is: "any machine to which you can log in, and on which you can run arbitrary code".

Kerberos authentication is currently not required for:

All other network accesses to computers on the Fermilab site must be preceded by Kerberos V5 authentication if the access is comparable to shell or FTP service.

Compliance can be achieved in different ways:

Furthermore, an on-site system may not be configured to accept a reusable login password over the network.

Telnet, ssh, and other connection program daemons must not prompt for or accept a Kerberos password. To log in over the network:

Off-site computers participating in Fermilab's strengthened realm must enforce comparably secure access mechanisms, but they are not required to use Kerberos V5.

Authentication Guidelines for On-site vs. Off-site Machines

First let us distinguish between an authentication method and a transport mechanism as they pertain to on-site versus off-site machines:

The following table summarizes Fermilab's policy regarding how strong authentication may be achieved on UNIX machines in the Fermilab strengthened realm depending on whether the machine is on- or off-site:

 

Authentication Method

Allowed for ON-site System?

Allowed for OFF-site System?

Kerberos V5 strong authentication via kerberos product (Fermi kerberos or from other source)

yes

yes

Kerberos-based authentication via software other than Kerberos (e.g., Kerberos-based ssh)

yes

yes

Clear-text reusable passwords entered at system console

yes

yes

Other non-reusable and/or non-clear-text password authentication over the network

no

yes

Non-Kerberos strong authentication (e.g., RSA or equivalent authentication) followed by obtaining Kerberos credentials via kinit over encrypted connection

no

no

Standard UNIX security (e.g., rhosts-based authentication)

no

no

Cleartext passwords (Kerberos or otherwise) transmitted over network

no

no

Transient Machines

Laptop machines brought in by visitors for short periods of time (e.g., a week) do not need to be registered or Kerberized. Visitors may use their host's accounts (with host's permission) at the host's responsibility, although sharing Kerberos passwords is not allowed. Local accounts that allow access only at the console will be permitted for visitors (no NIS accounts). Facilities created primarily for visitors may be granted exemptions from the requirement for Kerberos-validated users.

Obtaining an Exemption from the Policy

Exemptions from the strong authentication policy are granted on a case-by-case basis. Exemptions will be considered only for cases which involve a large effort for compliance and a small risk for noncompliance. If this applies to your situation, submit a Service Desk general request and the Service Desk will route your request as appropriate. The duration of any exemption granted is determined on a case-by-case basis.

Compliance with Policy

First, a few notes regarding good user practices:

Regarding penalties for noncompliance, see the Fermilab Policy on Computing (at http://security.fnal.gov/Policies/cpolicy.html).


See Also: