[20290] in Kerberos_V5_Development

home help back first fref pref prev next nref lref last post

Re: Add support for Access-Challenge response for OTP/RADIUS

daemon@ATHENA.MIT.EDU (Greg Hudson)
Thu Jun 10 10:58:26 2021

To: Alexander Bokovoy <abokovoy@redhat.com>
From: Greg Hudson <ghudson@mit.edu>
Message-ID: <94e04296-8cd2-83b8-286a-5594a564706c@mit.edu>
Date: Thu, 10 Jun 2021 10:58:07 -0400
MIME-Version: 1.0
In-Reply-To: <YMBvb10Gt2F9iTFj@redhat.com>
Content-Language: en-US
Cc: krbdev@mit.edu
Content-Type: text/plain; charset="utf-8"
Errors-To: krbdev-bounces@mit.edu
Content-Transfer-Encoding: 8bit

On 6/9/21 3:36 AM, Alexander Bokovoy wrote:
> - check if 'otp' string is present in the rock config
>   - if it is present, check if it contains a challenge request flag
>     - if challenge request flag is present, ask RADIUS server for the
>       information and expect it to return Access-Challenge with the
>       State attribute.
>       - if Access-Challenge is missing, fail OTP processing
>       - if Access-Challenge is present, set the challenge of the token
>     info into the challenge value from the RADIUS packet

This sounds reasonable.

> What we also need is to preserve the state from Access-Challenge to be
> reused when client response would come back.

Have a look at the set_cookie() and get_cookie() callbacks in the
kdcpreauth interface.  You can find an example of their use in
plugins/preauth/spake/spake_kdc.c.
_______________________________________________
krbdev mailing list             krbdev@mit.edu
https://mailman.mit.edu/mailman/listinfo/krbdev


home help back first fref pref prev next nref lref last post