[20549] in Kerberos_V5_Development

home help back first fref pref prev next nref lref last post

Re: Supporting custom requests for MS-NRPC

daemon@ATHENA.MIT.EDU (Alexander Bokovoy via krbdev)
Mon Sep 29 03:11:45 2025

Date: Mon, 29 Sep 2025 10:09:44 +0300
To: Greg Hudson <ghudson@mit.edu>
Cc: krbdev@mit.edu
Message-ID: <aNowuKjCWNigpbcV@redhat.com>
MIME-Version: 1.0
In-Reply-To: <0975e963-96db-4713-a8c7-e3617ef9fcc7@mit.edu>
Content-Disposition: inline
From: Alexander Bokovoy via krbdev <krbdev@mit.edu>
Reply-To: Alexander Bokovoy <abokovoy@redhat.com>
Content-Type: text/plain; charset="utf-8"; Format="flowed"
Errors-To: krbdev-bounces@mit.edu
Content-Transfer-Encoding: 8bit

On Пят, 26 вер 2025, Greg Hudson wrote:
>On 9/26/25 06:00, Alexander Bokovoy via krbdev wrote:
>>So I am thinking on how we can implement this in MIT Kerberos-based
>>Samba AD DC or FreeIPA domain controllers.
>
>Do these requests have to be serviced by the KDC process at all?  
>Could it be a separate daemon with access to the KDB?

Since it needs access to the encrypted keys, that separate daemon would
effectively be a KDC in the sense that it will need to verify signatures
and issue a PAC content. It is a large duplicate of the feature set
provided by the KDC code.

I would consider having a separate daemon in such case a security issue
as well.



-- 
/ Alexander Bokovoy
Sr. Principal Software Engineer
Security / Identity Management Engineering
Red Hat Limited, Finland

_______________________________________________
krbdev mailing list             krbdev@mit.edu
https://mailman.mit.edu/mailman/listinfo/krbdev


home help back first fref pref prev next nref lref last post