[36317] in Kerberos

home help back first fref pref prev next nref lref last post

Re: Client keytab ignored when CC has expired

daemon@ATHENA.MIT.EDU (Michael Osipov)
Thu Jul 31 17:26:02 2014

Message-ID: <53DAB45F.3080802@gmx.net>
Date: Thu, 31 Jul 2014 23:25:51 +0200
From: Michael Osipov <1983-01-06@gmx.net>
MIME-Version: 1.0
To: Greg Hudson <ghudson@mit.edu>
In-Reply-To: <53DA6653.9030906@mit.edu>
Cc: kerberos@mit.edu
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: kerberos-bounces@mit.edu

Am 2014-07-31 um 17:52 schrieb Greg Hudson:
> On 07/31/2014 03:24 AM, Michael Osipov wrote:
>> That sounds reasonable and should solve the issue. Albeit, I do think that the detection
>> algorithm could be better and pursue a best-effort/match/seldom-fail approach. It make the
>> entire process idiot-proof.
>
> I have opened a ticket for this:
>
>      http://krbdev.mit.edu/rt/Ticket/Display.html?id=7976

Great, waiting for this in 1.13 eagerly.

> I'm not sure if the process can be made completely idiot-proof, but it
> can certainly work better for the case where someone manually obtains
> credentials for the same principal as the one in the client keytab.

It would be better, at least.

> If a person gets credentials for a different principal, it's harder to be
> predictable.

If principals do not match, I would it expect to fail explicitly. Unless 
someone uses a DIR-style CC and knows how to operate with kswitch.

Michael


________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

home help back first fref pref prev next nref lref last post