Re: [kitten] Permissible (and imp..) side-effects of GSS_Acquire_cred()
Simo Sorce <simo@redhat.com> Sat, 28 March 2015 20:43 UTC
Return-Path: <simo@redhat.com>
X-Original-To: kitten@ietfa.amsl.com
Delivered-To: kitten@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 46E011A875B for <kitten@ietfa.amsl.com>; Sat, 28 Mar 2015 13:43:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.912
X-Spam-Level:
X-Spam-Status: No, score=-6.912 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FlBPi7yLOerP for <kitten@ietfa.amsl.com>; Sat, 28 Mar 2015 13:43:57 -0700 (PDT)
Received: from mx1.redhat.com (mx1.redhat.com [209.132.183.28]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B9EBA1A8025 for <kitten@ietf.org>; Sat, 28 Mar 2015 13:43:57 -0700 (PDT)
Received: from int-mx13.intmail.prod.int.phx2.redhat.com (int-mx13.intmail.prod.int.phx2.redhat.com [10.5.11.26]) by mx1.redhat.com (8.14.4/8.14.4) with ESMTP id t2SKhu3c032327 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Sat, 28 Mar 2015 16:43:56 -0400
Received: from [10.3.113.20] (ovpn-113-20.phx2.redhat.com [10.3.113.20]) by int-mx13.intmail.prod.int.phx2.redhat.com (8.14.4/8.14.4) with ESMTP id t2SKhtds003717; Sat, 28 Mar 2015 16:43:55 -0400
Message-ID: <1427575435.8302.132.camel@willson.usersys.redhat.com>
From: Simo Sorce <simo@redhat.com>
To: Jeffrey Altman <jaltman@secure-endpoints.com>
Date: Sat, 28 Mar 2015 16:43:55 -0400
In-Reply-To: <5516F5AC.2040904@secure-endpoints.com>
References: <20150311001817.GC7286@localhost> <1426771934.2981.127.camel@willson.usersys.redhat.com> <20150319151718.GD8099@localhost> <1426778409.2981.129.camel@willson.usersys.redhat.com> <20150319162847.GG8099@localhost> <1426784686.2981.130.camel@willson.usersys.redhat.com> <20150319173305.GH8099@localhost> <1426787041.2981.135.camel@willson.usersys.redhat.com> <5516F5AC.2040904@secure-endpoints.com>
Organization: Red Hat, Inc.
Content-Type: text/plain; charset="UTF-8"
Mime-Version: 1.0
Content-Transfer-Encoding: 7bit
X-Scanned-By: MIMEDefang 2.68 on 10.5.11.26
Archived-At: <http://mailarchive.ietf.org/arch/msg/kitten/3ZpuDmNcbLW8cR0TcSeP0PXfwY0>
Cc: kitten@ietf.org
Subject: Re: [kitten] Permissible (and imp..) side-effects of GSS_Acquire_cred()
X-BeenThere: kitten@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Common Authentication Technologies - Next Generation <kitten.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/kitten>, <mailto:kitten-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/kitten/>
List-Post: <mailto:kitten@ietf.org>
List-Help: <mailto:kitten-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/kitten>, <mailto:kitten-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 28 Mar 2015 20:43:59 -0000
On Sat, 2015-03-28 at 14:40 -0400, Jeffrey Altman wrote: > On 3/19/2015 1:44 PM, Simo Sorce wrote: > > On Thu, 2015-03-19 at 12:33 -0500, Nico Williams wrote: > >> On Thu, Mar 19, 2015 at 01:04:46PM -0400, Simo Sorce wrote: > >>> Would you consider an explicitly set KRB5CCNAME env variable as an > >>> indication the admin is ok with acquired credentials ending up there ? > >>> Ie a) but using KRB5CCNAME presence as an indication a ccache can be > >>> used ? > >> > >> That helps, though there can still be non-determinism when the ccache > >> does not exist yet. (But if the admin/user set it, why wouldn't they > >> also kinit -k to remove all doubt?) > > > > Because, at least with the current implementation of the Keytab > > initiation feature in MIT, if you kinit explicitly then > > gss_init_sec_context will not take over and keep initiating when > > credentials expires etc... > > > > I understand this may be simply an implementation issue/bug and it can > > be decided differently, but in general keytab initiation is used to > > allow unattended systems work on their own, so the admin will start a > > service with all the evn var set right and let it to it's own thing, > > requiring to script a manual kinit would defeat the purpose. > > > > So I am trying to see if you think a) is compatible with something > > priming an empty initial ccache provided that both KRB5CCNAME and > > KRB5_CLIENT_KTNAME have been set in the environment (both required). > > > > Simo. > > Simo, > > I would be more comfortable with an environment variable or krb5.conf > option that explicitly states to perform X behavior. The existence of > environment variables that are useful on their own in combination should > not should trigger an unexpected behavior. Especially when those > environment variables are interpreted different by different Kerberos > distributions. > > Just my two cents ... I think KRB5_CLIENT_KTNAME fits the description, its only use is to indicate which credentials to use for keytab initiation. I think it fair to assume that if an admin has explicitly set it that he wants to allow keytab initiation. Simo. -- Simo Sorce * Red Hat, Inc * New York
- Re: [kitten] Permissible (and imp..) side-effects… Simo Sorce
- Re: [kitten] Permissible (and imp..) side-effects… Nico Williams
- Re: [kitten] Permissible (and imp..) side-effects… Simo Sorce
- Re: [kitten] Permissible (and imp..) side-effects… Nico Williams
- Re: [kitten] Permissible (and imp..) side-effects… Simo Sorce
- Re: [kitten] Permissible (and imp..) side-effects… Nico Williams
- Re: [kitten] Permissible (and imp..) side-effects… Simo Sorce
- Re: [kitten] Permissible (and imp..) side-effects… Jeffrey Altman
- Re: [kitten] Permissible (and imp..) side-effects… Simo Sorce
- [kitten] Permissible (and imp..) side-effects of … Nico Williams