[2318] in Kerberos_V5_Development

home help back first fref pref prev next nref lref last post

Re: request comments on new ACL file format

daemon@ATHENA.MIT.EDU (Theodore Y. Ts'o)
Tue Mar 25 01:56:40 1997

Date: Tue, 25 Mar 1997 01:56:01 -0500
From: "Theodore Y. Ts'o" <tytso@MIT.EDU>
To: Ken Hornstein <kenh@cmf.nrl.navy.mil>
Cc: Tom Yu <tlyu@MIT.EDU>, krbdev@MIT.EDU
In-Reply-To: Ken Hornstein's message of Tue, 25 Mar 1997 00:54:18 -0500,
	<199703250554.AAA21134@ginger.cmf.nrl.navy.mil>

   Date: Tue, 25 Mar 1997 00:54:18 -0500
   From: Ken Hornstein <kenh@cmf.nrl.navy.mil>

   One question: why distinguish between user groups and target groups?
   Is there an implementation reason?  While I can't come up with a scenario
   where you might want to use a user group interchangably with a target
   group, it _might_ happen, and the separation seems rather arbitrary.

When you perform an:

	 permissions_check(client_principal, target_principal, operation) 

You need to get a list of all of the groups that client_principal
belongs to, and a list of all of the groups that target_principal
belongs to.  Recall that groups can contain wildcard entries, other groups,
and negations of wildcard entries, groups, or specific entries, i.e.

ugroup network	jis,tytso,tytso/*
tgroup hosts	hosts/*,!host/kerberos.mit.edu,!host/moira.mit.edu

Hence, to get the list of groups to which a client or target principal
belongs requires a individual check of each group in the client or
target principal list.  By distinguishing between user and target
groups, we reduce the number of comparisons that might need to be made.

						- Ted


home help back first fref pref prev next nref lref last post