[20115] in Kerberos_V5_Development
Re: Alternative proxy-creds API for constrained-delegation
daemon@ATHENA.MIT.EDU (Isaac Boukris)
Wed Jun 3 12:54:40 2020
MIME-Version: 1.0
In-Reply-To: <20200603155749.GX7856@localhost>
From: Isaac Boukris <iboukris@gmail.com>
Date: Wed, 3 Jun 2020 18:54:01 +0200
Message-ID: <CAC-fF8Rf+Z2_w=2AYNJ=iXtb7yOnKLqbfQzMa2nUUNCfFpqJnw@mail.gmail.com>
To: Nico Williams <nico@cryptonector.com>
Cc: Simo Sorce <simo@redhat.com>, "krbdev@mit.edu Dev List" <krbdev@mit.edu>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: krbdev-bounces@mit.edu
On Wed, Jun 3, 2020 at 5:58 PM Nico Williams <nico@cryptonector.com> wrote:
>
> On Wed, Jun 03, 2020 at 02:15:58PM +0200, Isaac Boukris wrote:
> > On Wed, Jun 3, 2020 at 6:53 AM Nico Williams <nico@cryptonector.com> wrote:
> > > Here's the idea:
> > >
> > > - you always get a deleg_cred_handle if one was delegated or S4U2Proxy
> > > is available,
> > >
> > > - you tell gss_store_cred_into() about what you're willing to store and
> > > with what options,
> > >
> > > - if you say "only real creds" then gss_store_cred_into() will not
> > > store S4U2Proxy creds.
> >
> > This sounds a lot of application logic, and we also don't want to
> > implicitly delegate a ticket at this point.
>
> On the contrary, this makes the app simpler because configuration now is
> something of a hole: the app doesn't need to know anything about it, it
> just passes through settings from a config file.
>
> We do this in our sshd already, so it won't need _any_ changes in order
> to use this new configuration parameter.
Not sure I follow, so your sshd won't need any changes, how does that
make it simple for others? And again, we don't want to implicitly
delegate a ticket at this point.
> > btw, we don't have to call it s4u2proxy creds, it's just a tgt-less
> > cache with a service ticket, maybe we could use it in different
> > manners as well (for local auth, or maybe invent a way to authenticate
> > to the kdc with it?).
>
> I'm going to call them S4U2Proxy creds. To me that's what they are. It
> tells me what I need to know: that initiator credentials for the service
> are needed.
That's what they are now, but I think we can make other uses of it as
pointed out.
_______________________________________________
krbdev mailing list krbdev@mit.edu
https://mailman.mit.edu/mailman/listinfo/krbdev