⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 security.txt

📁 C-Kermit源码。是使用串口/Modem和网络通讯的程序
💻 TXT
📖 第 1 页 / 共 5 页
字号:
SECURITY FEATURES FOR AUTHENTICATION AND ENCRYPTION OF TCP/IP CONNECTIONSIN C-KERMIT 7.0 AND KERMIT 95 1.1.1930 January 2000CONTENTS    1. INTRODUCTION    2. DISCLAIMERS    3. AVAILABILITY    3.1  Authentication and Encryption in Kermit 95    3.1.1  Kerberos in Kermit 95    3.1.2  Secure Remote Password (SRP) in Kermit 95    3.1.3  NTLM in Kermit 95    3.1.4  OpenSSL support for SSLv3 and TLSv1 in Kermit 95    3.2  Authentication and Encryption in C-Kermit    3.2.1  Kerberos in C-Kermit    3.2.2  Secure Remote Password (SRP) in C-Kermit    3.2.3  OpenSSL support for SSLv3 and TLSv1 in C-Kermit    3.2.4  Shadow Passwords in C-Kermit    3.2.5  Pluggable Authentication Modules (PAM) in C-Kermit    4. GLOSSARY    5. AUTHENTICATION PROTOCOL OVERVIEWS    5.1 KERBEROS    5.2 SECURE REMOTE PASSWORD (SRP)    5.3 NT LAN MANAGER (NTLM)    5.4 SSLv3 and TLSv1    6. AUTHENTICATION AND ENCRYPTION COMMANDS    6.1. TELNET-Related Commands    6.2. The SET AUTHENTICATION Command    6.2.1. Kerberos settings    6.2.2. SRP settings    6.2.3. SSL and TLS settings    6.3. The AUTHENTICATE Command    7. EFFECTS OF ENCRYPTION ON FILE TRANSFER PERFORMANCE    8. MULTI-HOMED HOSTS AND NETWORK ADDRESS TRANSLATORS    9. OTHER NOTES   10. VARIABLES   10.1 GENERAL AUTHENTICATION VARIABLES   10.2 KERBEROS VARIABLES   10.3 SSL/TLS VARIABLES   11. FUNCTIONS   12. SCRIPTING HINTS   12.1. Kerberos Autoget   12.2. Autodestruction of Kerberos credentials   12.3. Automated Prompting for Usernames   12.4. Password Inclusion in Script Files   12.5  Using Kermit Scripts to Produce Secure Telnet Services   13. USING OTHER SECURITY METHODS WITH KERMIT   13.1  Implementing other security methods for Kermit 95   14. AN INTRODUCTION TO CERTIFICATES AND CERTIFICATE AUTHORITIES WITH OPENSSL   14.1  What Are Certificates, Private Keys, CSRs, CAs, and CRLs?   14.2  RSA Certificates v. DSA Certificates   14.3  Should You Be Your own Certificate Authority?   14.4  Generating a DSA CA (self-signed) certificate   14.5  Generating a DSA CSR   14.6  Generating a RSA CA (self-signed) certificate   14.7  Generating a RSA CSR   14.8  Signing a CSR with your CA certificate   14.9  Revoking a Certificate   14.10 Generating a CRL1. INTRODUCTION  This document describes Kerberos(TM), Secure Remote Password (SRP)(TM)  protocol, Secure Sockets Layer (SSL)/Transport Layer Security (TLS), and  other security implementations in, or to be used with, current or  forthcoming releases of Kermit software.  All information presented here  is preliminary and subject to review, change, or withdrawal prior to final  release.  NOTE: The terms "Windows 95" and "Windows 9x" in this document  refer to both Windows 95 and Windows 98; the term "Windows NT" refers to  Windows NT 3.51 and later and to Windows 2000.Security is a hot topic on the Internet, and security methods abound.  Secureconnection methods are supported indirectly by the methods described in"Supplement to 'Using C-Kermit', Second Edition", file ckermit2.txt, Section2.7.4.  This document describes authentication methods that can be built intoKermit 95 and C-Kermit.  Presently these are: Kerberos, Secure Remote Password(SRP), Secure Sockets Layer(SSL)/Transport Layer Security(TLS), and MicrosoftNT LAN Manager (NTLM).A secure connection is one that provides: . Authentication of the user to the host/service without the transmission   of the user's password; . Authentication of the host to the user; and: . A shared secret that can be used with an encryption algorithm to ensure   the data transmitted over the connection is understood by only the   client and host.C-Kermit and Kermit 95 are capable of creating and accepting secureconnections via a variety of methods: . Incoming and outgoing secure connections may be established using Telnet   protocol coupled with Kerberos(TM), Secure Remote Password (SRP)(TM),   Secure Sockets Layer (SSL)/Transport Layer Security (TLS), and Microsoft   NTLM. . Outgoing secure connections may be established using Rlogin protocol   coupled with Kerberos (TM). . Incoming and outgoing secure connections may be established using   Secure Sockets Layer (SSL)/Transport Layer Security (TLS) alone.1.1. KerberosKerberos(TM) is a method, developed at Massachusetts Institute of Technology,by which two parties communicating over a TCP/IP connection can authenticateeach other through a trusted third party without sending passwords orencryption keys in clear text over the network.  Kerberos protocols aredefined in Internet RFCs 1510, 1964, and others.  You can read more aboutKerberos at:  http://web.mit.edu/kerberos/www/  http://nii.isi.edu/info/kerberos/  http://nii.isi.edu/publications/kerberos-neuman-tso.htmlThere are, in fact, two Kerberos protocols: Kerberos IV (4) and Kerberos V(5), the latter being the more flexible and secure protocol.  The two aretotally separate and incompatible.  Any given site might support neither,either one, or both.When both the client and server support the same version of Kerberos (4 or 5),then Kerberos authentication with or without encryption can be negotiated.A "Kerberized" version of Kermit can make a connection to a non-Kerberizedhost, and a non-Kerberized host can accept a connection from a Kerberizedversion of Kermit, as long as neither side is configured to require Kerberosauthentication.1.2. SRPSecure Remote Password (SRP)(TM) protocol is a method, developed at StanfordUniversity, by which two parties communicating over a TCP/IP connection canauthenticate each other in a secure manner through a Zero KnowledgeIdentification system.  SRP protocols have not yet been accepted as RFCs.You can read more about SRP at:  http://srp.stanford.edu/srp/Once authentication has been achieved with either Kerberos or SRP, a sharedsecret is available which can be used to establish an encrypted session.1.3. NTLMNT Lan Manager (NTLM) authentication is only implemented in Kermit 95.Its only use is to authenticate Kermit 95 to Microsoft's NT Services forUnix Telnetd.  NTLM does not negotiate a shared secret and thereforecannot be used to establish encrypted sessions.  Therefore, connectionsmade with NTLM should not be considered secure.1.4. EncryptionExport of encryption software or algorithms is regulated by United States law(see Section 2).  United States and Canadian residents may contact the KermitProject for encryption modules that can be used to provide securecommunications using one of the following encryption algorithms via the TelnetEncryption Option:   cast128_cfb64   cast5_40_cfb64   des_cfb64   des3_cfb64   cast128_ofb64   cast5_40_ofb64   des_ofb64   des3_ofb64Netscape's Secure Sockets Layer (SSL) and its IETF-approved successor,Transport Layer Security (TLS), provide for authentication and encryption ofTCP/IP communications using a combination of public key and symmetriccryptographic algorithms.  Authentication of the server (and optionally theclient) is performed by exchanging ITU-T X.509 certificate chains (see Section14 below), which are then verified by the receiver.  Unlike raw public keys,X.509 certificates may be revoked by issuing a certificate revocation list(CRL) which is to be checked by the receiver during verification of thecertificate chain.The encryption provided by SSL/TLS is more secure than the encryptionnegotiatied by the Telnet Encryption Option.  This additional security isprovided by a combination of the use of longer encryption keys; theavailability of stronger symmetric cryptographic algorithms; and the signingof each transmitted block with a message digest algorithm.TLS may be used in conjunction wth Telnet Authentication methods such asKerberos, Secure Remote Password, and NTLM to provide the highest level ofdata privacy with the strongest forms of mutual authentication.The Kermit modules used to implement SSL/TLS are available only to residentsof the United States and Canada due to the restrictions on the export ofsoftware that provides "crypto with a hole" functionality.2. DISCLAIMERSCurrent US law forbids export of strong encryption software from the USA toall countries except Canada.  Thus security modules are not included withKermit; they must be obtained separately from the sources listed below, incompliance with the terms and conditions given at those sites and with UnitedStates and international law.  For an overview of this issue, see (forexample):  http://www.mozilla.org/crypto-faq.htmlKermit software, when combined with the security modules listed in thisdocument, has been verified to negotiate and conduct authenticated andencrypted sessions with Kerberos and/or SRP services on Internet hosts atColumbia University and other test sites, with Kermit features such asinteractive terminal access, file transfer, and scripting operatingsuccessfully over Kerberized connections, with any exceptions noted below.The Kermit Project does not and can not claim or warrant the externalKerberos, SRP, OpenSSL or other third-party modules to be free of loopholesor bugs.  Authentication via Kerberos and/or SRP is not unbreakable.  Anyencryption method can be broken.  Any software that is used forauthentication or encryption should be analyzed for weaknesses, backdoors,bugs, and loopholes by the site and/or end user before use.The Kermit Project and Columbia University make no claim or warranty as to anyparticular level of security achievable by Kermit software in conjunction witheither Kerberos or Secure Remote Password protocol, and may on no account beheld liable for any damage resulting from its use (a more complete statementto this effect is found in the C-Kermit 7.0 license).Functional limitations: . Kerberos authentication is available only on Telnet and Rlogin connections. . Secure Remote Password authentication is available only on Telnet   connections. . NTLM authentication is available only on Windows 95/98 and NT and only   on Telnet connections. . SSL/TLS may be used as its own connection protocol or on Telnet   connections. . Kerberos support is not available in Kermit 95 for OS/2 due to lack   of Kerberos implementations for OS/2.3. AVAILABILITY3.1 Authentication and Encryption in Kermit 95Kermit 95 comes precompiled with support for Kerberos 4, Kerberos 5, SecureRemote Password, NT Lan Manager authentication, and OpenSSL's SSLv3 and TLSv1.3.1.1. Kerberos in Kermit 95Beginning with version 1.1.16, Kermit 95 supports Kerberos TelnetAuthentication when any of the following Kerberos IV or Kerberos Vimplementations are installed on a Windows 95 or Windows NT workstation:  Kerberos version 4:    . MIT Leash distribution:        http://web.mit.edu/is/help/mink/  For version 5:    . MIT distribution:        http://web.mit.edu/kerberos/www/    . Cygnus Solutions' KerbNet 1.2:        http://www.cygnus.com/techie/kerbnet/Both Kerberos IV and Kerberos V may be installed on the same PC, and the samecopy of Kermit 95 can use either Kerberos version to make Telnet connections.As of Kermit 95 1.1.18 Kerberized Rlogin connections are supported if theKerberos DLLs export necessary functionality.When Kerberos IV and/or Kerberos V are installed and the DLLs are located inthe PATH, Kermit 95 attempts to negotiate authentication with the host'sTelnet server if the host is Kerberized and if you have not instructedKermit 95 to the contrary.In addition, if the appropriate encryption patch (obtained from the KermitProject) is installed, two-way encryption is also negotiated and used ifauthentication was negotiated.  The encryption patch is available WITH EXPORTRESTRICTIONS at:  http://www.kermit-project.org/noexport.htmlDue to the length of the shared secret negotiated by Kerberos only 56-bit DESencryption can be used.Per-PC configuration files may or may not be necessary at your installation.If your site's DNS servers supply Kerberos realm information, noconfiguration files are needed and you can skip ahead to Section 3.1.2.3.1.1.1 Notes on the Kerberos IV configuration files:MIT's Leash uses three configuration files which are placed into the \WINDOWSdirectory: LEASH.INI (user settings), KRB.CON and KRBREALM.CON.  KRB.CON andKRBREALM.CON are used by Kerberos IV to map your host's domain name to arealm and then to determine the name of the Kerberos server for that realm.As distributed from MIT, these files are set up for MIT's realm, domain,and host information, so if you are not at MIT you'll need to substitute theinformation for your own site; for example:KRB.CON:  CC.COLUMBIA.EDU  CC.COLUMBIA.EDU kerberos.cc.columbia.edu  KERMIT.COLUMBIA.EDU kerberos.cc.columbia.edu  COLUMBIA.EDU kerberos.cc.columbia.edu  .KERBEROS.OPTION. dnsThe first line is the default Kerberos IV realm to be used.  The subsequentlines list realms and the hostnames to be used to contact the KDC for thatrealm.KRBREALM.CON:  .CC.COLUMBIA.EDU CC.COLUMBIA.EDU  CC.COLUMBIA.EDU CC.COLUMBIA.EDU  .COLUMBIA.EDU CC.COLUMBIA.EDU  COLUMBIA.EDU CC.COLUMBIA.EDU  .KERMIT.COLUMBIA.EDU CC.COLUMBIA.EDU  KERMIT.COLUMBIA.EDU CC.COLUMBIA.EDU

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -