[33010] in Kerberos

home help back first fref pref prev next nref lref last post

Re: GSS_C_NO_NAME for desired_name?

daemon@ATHENA.MIT.EDU (Brian Candler)
Sat Jan 1 09:31:47 2011

Date: Sat, 1 Jan 2011 14:31:29 +0000
From: Brian Candler <B.Candler@pobox.com>
To: Greg Hudson <ghudson@mit.edu>
Message-ID: <20110101143129.GA4124@talktalkplc.com>
MIME-Version: 1.0
Content-Disposition: inline
In-Reply-To: <1293816853.2456.238.camel@ray>
Cc: "kerberos@mit.edu" <kerberos@mit.edu>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: kerberos-bounces@mit.edu

On Fri, Dec 31, 2010 at 12:34:13PM -0500, Greg Hudson wrote:
> On Fri, 2010-12-31 at 06:32 -0500, Brian Candler wrote:
> > I'd like to propose this upstream, but first would like some feedback as to
> > whether this is likely to be a safe change to make, remembering that some
> > people may be using older versions of MIT, or different Kerberos libraries,
> > underneath GSSAPI.
> 
> It's quite interoperable.
> 
> The one potential concern is that by allowing the initiator to use any
> key in the keytab, you could potentially allow a client to authenticate
> to, say, a host service using an HTTPD service ticket, if both keys are
> in the host keytab.  That gives your httpd a way to get root access,
> potentially.

But if you were able to get a ticket for HTTP/foo, wouldn't the KDC also
give you a ticket for host/foo ?

My understanding was that Kerberos was about authentication rather than
authorization, and the KDC will happily give you a ticket for anyone that
you want to prove your identity to.  Are some people putting controls on the
issuance of tickets as a means of access control?

Regards,

Brian.
________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

home help back first fref pref prev next nref lref last post