| home | help | back | first | fref | pref | prev | next | nref | lref | last | post |
Date: Sat, 26 Apr 2025 19:46:13 -0500 From: Nico Williams <nico@cryptonector.com> To: Michael B Allen <ioplex@gmail.com> Cc: kerberos <kerberos@mit.edu> Message-ID: <aA1+VaGCHTYgTTjK@ubby> MIME-Version: 1.0 Content-Disposition: inline In-Reply-To: <CAGMFw4gHvZ9nRLx1Q=sWCXagHXEi_XJvMkczZK2hy62Vq9aKzg@mail.gmail.com> Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Errors-To: kerberos-bounces@mit.edu On Sat, Apr 26, 2025 at 07:32:35PM -0400, Michael B Allen wrote: > Ideally there should be some unix socket service that just processes gss > tokens. That's gssd, variously named. > Being a separate process it can do crypto without exposing base keys and > even store the plaintext password (encrypted of course) used to login to > the device and achieve true SSO. > It would provide persistence so that transient processes can get creds > without prompting. > It would normalize the prompting. If you want apps not to see even passwords, then you can only do this by having a visual desktop and dialog pop-ups _or_ (and/or) the OS can use the login and screen unlock interactions + caching. > Presumably no such service exists so what can I do? No, it does. It's called gssd, or rpc.gssd, etc. > You seem to be suggesting that each of potentially multiple applications > should be able to trap on an error, prompt for initial credentials (in > whatever way) and then do an a-typical gss_acquire_cred_with_password with > just the IAKERB mech. No, I'm suggesting that only the login screen, screen unlock screen, and RDP-like apps should bother with interaction for initial credential acquisition. Nico -- ________________________________________________ Kerberos mailing list Kerberos@mit.edu https://mailman.mit.edu/mailman/listinfo/kerberos
| home | help | back | first | fref | pref | prev | next | nref | lref | last | post |