Re: [kitten] Checking the transited list of a kerberos ticket in a transitive cross-realm trust situation...

Isaac Boukris <iboukris@gmail.com> Fri, 07 February 2020 12:26 UTC

Return-Path: <iboukris@gmail.com>
X-Original-To: kitten@ietfa.amsl.com
Delivered-To: kitten@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 389FA12023E for <kitten@ietfa.amsl.com>; Fri, 7 Feb 2020 04:26:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CNHBkzND_bmx for <kitten@ietfa.amsl.com>; Fri, 7 Feb 2020 04:26:28 -0800 (PST)
Received: from mail-lf1-x129.google.com (mail-lf1-x129.google.com [IPv6:2a00:1450:4864:20::129]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DFD2C120836 for <kitten@ietf.org>; Fri, 7 Feb 2020 04:26:27 -0800 (PST)
Received: by mail-lf1-x129.google.com with SMTP id z26so1380590lfg.13 for <kitten@ietf.org>; Fri, 07 Feb 2020 04:26:27 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=Dv9wvP3KHXa1E5JYZzJizwfRahjh6d3QSksZ49PxBlo=; b=qfCnWExxMuPcJz19CTGOA2Qgi3zL/7QZ+yB2PPFg2WiFBrl+37bxmpc2Ete69ce0lh 9/R6R9PzaybyNXorMAmRhEAAHtGVdumiQ+wFAKDNDvMiWkUDyD4kuDzb9Jp6BnZGMbHn M+tQG4dUmaDrSdfnXHPgAbs6s6E3RvO6m8mZCF3UFMCPzj6euExrtfst5hkUiq2HWbt+ RsqtyRW6+kZ02lhgW4NH19SV0oAHkfiftwopi5uUzD9nyrJjiNisGGChCTCnHN0YZq0I He9A4Ay6pGj0M+ynhgzU2nZQ+ON6okQDGO4bAHnMtfV3A6tMISOdZVUq4ySFop4Mf2Xa /7Mw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=Dv9wvP3KHXa1E5JYZzJizwfRahjh6d3QSksZ49PxBlo=; b=R3HO6t7UP1JSDT/h2Y/Gvk0vZBxkkwW99qIAs0NolaG80CiBQ6dziVtl2CajmoOkka QeEQALl6c+qazwGzH7rkICeNg+ZreV/VDi2g5u26hQz5Pfe4bjwmcaiZlOZdEevPJYOd l7mf4KP0WHoOed7YeIQfibHeqlvbAUT14Fc3hTxZISu9iAMoIhRNWR2dxpUoTNR2M+sD MFaAvS2vuBy8blFe2R0vpzkyn7iNDw/grBVxvdDCuu2Zf/dkoBlRXkQiw6f5nRC5TQao AlOyuV41luQhWde/v/EKvV1NQPGx4Y+kXlfZNMn53Yqollkwpn5jft9PVUTJ3rfKAQ0j 3ROQ==
X-Gm-Message-State: APjAAAV1/woyzr6Rc9AWXDO+2ARUkycuD06cQX/aV65HoEpJ4Zg+Te+J QZipoVKyux5+4/uRGETYy5WMqLqjNGatC7+kcM/souTt
X-Google-Smtp-Source: APXvYqzr2wQvMemibqCzeNPyKHqqpQoHj3NKfPKDX0qPKo6Uwpv5xAEseQG459cIo1nqrtmdWXaHvJW42m21LS6YwFI=
X-Received: by 2002:ac2:5f65:: with SMTP id c5mr4471962lfc.207.1581078385999; Fri, 07 Feb 2020 04:26:25 -0800 (PST)
MIME-Version: 1.0
References: <69d80d24-d461-1652-3cfb-e55d90d31fbf@samba.org> <ec067a72-313e-1878-33a0-a3259d2979d5@mit.edu> <1503578184.3428.19.camel@redhat.com> <db882372-aa1d-e58e-4c94-a268539bd2ee@samba.org> <1503596189.3428.26.camel@redhat.com> <F363B51E-FDF7-4C91-9ABD-B623B5CE97BC@dukhovni.org> <8f68cfb0-2d6b-d86f-4ff0-a9282aa0bf55@samba.org> <cb0d7433-9e23-5bce-4e06-1213bf88cade@samba.org> <20191121223908.GC26241@localhost> <22f96c93-0217-0b2b-d7e1-684f9269fba4@samba.org> <20191122224526.GA28614@localhost>
In-Reply-To: <20191122224526.GA28614@localhost>
From: Isaac Boukris <iboukris@gmail.com>
Date: Fri, 07 Feb 2020 13:26:14 +0100
Message-ID: <CAC-fF8S=yxgx5qL5ZwFocij_DzsHPBzf8LcZACo9HVF5DDSxLA@mail.gmail.com>
To: Nico Williams <nico@cryptonector.com>
Cc: Stefan Metzmacher <metze@samba.org>, "heimdal-discuss@sics.se" <heimdal-discuss@sics.se>, Samba Technical <samba-technical@lists.samba.org>, "krbdev@mit.edu Dev List" <krbdev@mit.edu>, kitten@ietf.org
Content-Type: text/plain; charset="UTF-8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/kitten/80X1ROt6AqwghEKKPVJA0-Dswe0>
Subject: Re: [kitten] Checking the transited list of a kerberos ticket in a transitive cross-realm trust situation...
X-BeenThere: kitten@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Common Authentication Technologies - Next Generation <kitten.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/kitten>, <mailto:kitten-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/kitten/>
List-Post: <mailto:kitten@ietf.org>
List-Help: <mailto:kitten-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/kitten>, <mailto:kitten-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Feb 2020 12:26:30 -0000

Hi,

On Fri, Nov 22, 2019 at 11:45 PM Nico Williams <nico@cryptonector.com> wrote:
>
> On Fri, Nov 22, 2019 at 11:24:44AM +0100, Stefan Metzmacher wrote:
> > > Correspondingly and symmetrically, the right way to request some
> > > behavior on the side where the credential is available, is to associate
> > > that request with the desired_name for which the credential is acquired.
> >
> > So you mean we need to pass an explicit desired_name to
> > gss_acquire_cred_from() and use gss_set_name_attribute() calls
> > (for no_transit_check and iterate_acceptor_keytab) on that desired_name
> > before?
>
> Oh, wait, right.  That's not going to work when you want a default
> credential.

Maybe the name-attributes can be made complementary to the proposed
credential-options, if a service wishes to inquire this info.