[11897] in Kerberos-V5-bugs
[krbdev.mit.edu #6870] SVN Commit
daemon@ATHENA.MIT.EDU (Greg Hudson via RT)
Wed Feb 16 18:34:39 2011
Mail-followup-to: rt@krbdev.mit.edu
mail-copies-to: never
From: "Greg Hudson via RT" <rt-comment@krbdev.MIT.EDU>
In-Reply-To: <rt-6870@krbdev.mit.edu>
Message-ID: <rt-6870-33799.8.92695725972111@krbdev.mit.edu>
To: "'AdminCc of krbdev.mit.edu Ticket #6870'":;"'AdminCc of krbdev.mit.edu Ticket #6870'":;@MIT.EDU
Date: Wed, 16 Feb 2011 18:34:38 -0500 (EST)
Reply-To: rt-comment@krbdev.MIT.EDU
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: krb5-bugs-bounces@mit.edu
Experience has shown that it was a mistake to fail AP-REQ verification
based on failure to verify the signature of PAC authdata contained in
the ticket. We've had two rounds of interoperability issues with the
hmac-md5 checksum code, an interoperability issue OSX generating
unsigned PACs, and another problem where PACs are copied by older KDCs
from a cross-realm TGT into the service ticket. If a PAC signature
cannot be verified, just don't mark it as verified and continue on
with the AP exchange.
http://src.mit.edu/fisheye/changelog/krb5/?cs=24640
Commit By: ghudson
Revision: 24640
Changed Files:
U trunk/src/include/k5-trace.h
U trunk/src/lib/krb5/krb/pac.c
_______________________________________________
krb5-bugs mailing list
krb5-bugs@mit.edu
https://mailman.mit.edu/mailman/listinfo/krb5-bugs