krb5 commit: Document TXT records for realm lookup

Benjamin Kaduk kaduk at MIT.EDU
Wed Oct 10 12:24:46 EDT 2012


https://github.com/krb5/krb5/commit/89465b37e226f75e5685aae1d3848f8c467f9d02
commit 89465b37e226f75e5685aae1d3848f8c467f9d02
Author: Ben Kaduk <kaduk at mit.edu>
Date:   Thu Oct 4 13:42:13 2012 -0400

    Document TXT records for realm lookup
    
    Even though they are subject to vulnerabilities via DNS spoofing
    and we accordingly don't recommend their use, we do have the code
    to use them.  Just as we document dns_lookup_realm in krb5.conf(5),
    document them here.
    
    ticket: 7407

 doc/rst_source/krb_admins/realm_config.rst |   23 ++++++++++++++++++++++-
 1 files changed, 22 insertions(+), 1 deletions(-)

diff --git a/doc/rst_source/krb_admins/realm_config.rst b/doc/rst_source/krb_admins/realm_config.rst
index 2a0e0cc..a19c3d7 100644
--- a/doc/rst_source/krb_admins/realm_config.rst
+++ b/doc/rst_source/krb_admins/realm_config.rst
@@ -38,7 +38,7 @@ descriptive names which end with your domain name, such as::
 Mapping hostnames onto Kerberos realms
 --------------------------------------
 
-Mapping hostnames onto Kerberos realms is done in one of two ways.
+Mapping hostnames onto Kerberos realms is done in one of three ways.
 
 The first mechanism works through a set of rules in the
 :ref:`domain_realm` section of :ref:`krb5.conf(5)`.  You can specify
@@ -60,6 +60,27 @@ the KDC must be running MIT krb5 1.7 or later.  The
 :ref:`kdc_realms` section of :ref:`kdc.conf(5)` can be used to
 fine-tune referral behavior on the KDC.
 
+It is also possible for clients to use DNS TXT records, if
+**dns_lookup_realm** is enabled in :ref:`krb5.conf(5)`.  Such lookups
+are disabled by default because DNS is an insecure protocol and security
+holes could result if DNS records are spoofed.  If enabled, the client
+will try to look up a TXT record formed by prepending the prefix
+``_kerberos`` to the hostname in question.  If that record is not
+found, the client will attempt a lookup by prepending ``_kerberos`` to the
+host's domain name, then its parent domain, up to the top-level domain.
+For the hostname ``boston.engineering.example.com``, the names looked up
+would be::
+
+    _kerberos.boston.engineering.example.com
+    _kerberos.engineering.example.com
+    _kerberos.example.com
+    _kerberos.com
+
+The value of the first TXT record found is taken as the realm name.
+
+Even if you do not choose to use this mechanism within your site,
+you may wish to set it up anyway, for use when interacting with other sites.
+
 
 Ports for the KDC and admin services
 ------------------------------------


More information about the cvs-krb5 mailing list