[39382] in Kerberos

home help back first fref pref prev next nref lref last post

Re: Looking for a "Kerberos Router"?

daemon@ATHENA.MIT.EDU (Simo Sorce)
Wed Mar 13 16:49:05 2024

Message-ID: <ff6b1159594ccac0297ddcda93901dab0f22e61d.camel@redhat.com>
From: Simo Sorce <simo@redhat.com>
To: Yoann Gini <yoann.gini@gmail.com>, Ken Hornstein <kenh@cmf.nrl.navy.mil>
Cc: kerberos@mit.edu
Date: Wed, 13 Mar 2024 16:47:51 -0400
In-Reply-To: <08C219DB-7B64-48FD-A500-3A043BDED825@gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Errors-To: kerberos-bounces@mit.edu
Content-Transfer-Encoding: 8bit

This is well tested:
https://github.com/latchset/kdcproxy


On Wed, 2024-03-13 at 17:32 +0100, Yoann Gini wrote:
> 
> > Le 13 mars 2024 à 17:21, Ken Hornstein <kenh@cmf.nrl.navy.mil> a écrit :
> > 
> > It does occur to me that maybe if you have different KDC hostnames but
> > the same IP address you could use TLS SNI or hostname routing which
> > you indicated you already use and maybe that would be simpler?  That
> > presumes the client implementations set the SNI field (I see that it
> > does send a "Host" header, and it looks like MIT Kerberos does set the
> > SNI hostname).
> 
> This is what I have in mind looking at the documentation of kkdcp (reading as exchanging here). Using SNI to select the KDC.
> 
> I will give it a try, it looks like the option I need here.
> 
> And yes, all of those complexities would have been avoided by network teams just supporting IPv6 and not blocking random ports for no reasons…
> ________________________________________________
> Kerberos mailing list           Kerberos@mit.edu
> https://mailman.mit.edu/mailman/listinfo/kerberos


-- 
Simo Sorce
Distinguished Engineer
RHEL Crypto Team
Red Hat, Inc









________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos


home help back first fref pref prev next nref lref last post