[krbdev.mit.edu #2641] KRB5_KDB_DISALLOW_SVR flag unnecessari ly prevents User2User

pcmoore@sandia.gov via RT rt-comment at krbdev.mit.edu
Thu Jul 22 16:15:47 EDT 2004


I agree that the proposed fix would cause a 
subtle change of KDC behavior, but like Ken, 
I can't imagine that it would catch anyone 
by surprise.  And the fix is a really
important security feature to any site that needs
to allow user2user, and to require preauthentication.

Text could be added to the
release notes that this fix allows user2user
tickets for principals that are set 
-allow_svr (which was not the case in 
previous KDCs)

I also think the documentation could be 
made more clear. 


Below are four suggested changes 
to doc/admin.texinfo

1)---------------------------
OLD admin.texinfo:
@itemx dup-skey
Enabling this flag allows the principal 
to obtain a session key for
another user, permitting user-to-user 
authentication for this principal.

NEW admin.texinfo:
@itemx dup-skey
Enabling this flag allows the KDC to 
issue a user-to-user service ticket  
for this principal.

2)--------------------
OLD admin.texinfo:
@itemx service
Enabling this flag allows the KDC 
to issue service tickets for this
principal.

NEW admin.texinfo:
Enabling this flag allows the KDC 
to issue service tickets for this
principal that contain text encrypted 
in the principal's key, which may 
be a security issue. 

3) -------------------------
OLD admin.texinfo:
@item @{-|+@}allow_dup_skey
The ``-allow_dup_skey'' option disables 
user-to-user authentication for
this principal by prohibiting this 
principal from obtaining a session
key for another user.  
``+allow_dup_skey'' clears this flag.  
In effect,``-allow_dup_skey'' sets 
the @* KRB5_KDB_DISALLOW_DUP_SKEY flag on the
principal in the database.

NEW admin.texinfo:
@item @{-|+@}allow_dup_skey
The ``-allow_dup_skey'' option disables 
user-to-user authentication for
this principal by prohibiting others 
from obtaining a service ticket encrypted 
in this principal's TGT session key. 
 ``+allow_dup_skey'' clears this flag.  
In effect,``-allow_dup_skey'' sets the 
@* KRB5_KDB_DISALLOW_DUP_SKEY flag on the
principal in the database.


4) -------------------------------------
OLD admin.texinfo:
@item @{-|+@}allow_svr
The ``-allow_svr'' flag prohibits the issuance 
of service tickets for this principal.  
``+allow_svr'' clears this flag.  In effect,
``-allow_svr'' sets the 
@* KRB5_KDB_DISALLOW_SVR flag on the 
principal in the database.

NEW admin.texinfo:
@item @{-|+@}allow_svr
The ``-allow_svr'' flag prohibits the issuance 
of service tickets for this principal 
that contain text encrypted in the
principal's key. Failing to set ``-allow_svr``
on user principals may be a security issue.
``+allow_svr'' clears this flag.  In effect,
``-allow_svr'' sets the 
@* KRB5_KDB_DISALLOW_SVR flag on the 
principal in the database.



More information about the krb5-bugs mailing list