krb5 commit: Omit signedpath if no_auth_data_required is set
Greg Hudson
ghudson at MIT.EDU
Tue Aug 20 00:25:41 EDT 2013
https://github.com/krb5/krb5/commit/eaaf406f5ab3224fc262da300476efa21b407bed
commit eaaf406f5ab3224fc262da300476efa21b407bed
Author: Greg Hudson <ghudson at mit.edu>
Date: Mon Aug 19 20:01:03 2013 -0400
Omit signedpath if no_auth_data_required is set
The no_auth_data_required bit was introduced to suppress PACs in
service tickets when the back end supports them. Make it also
suppress AD-SIGNEDPATH, so that the ~70-byte expansion of the ticket
can be avoided for services which aren't going to do constrained
delegation.
ticket: 7697 (new)
doc/admin/admin_commands/kadmin_local.rst | 9 +++++++++
doc/admin/conf_files/kdc_conf.rst | 4 ++--
src/kdc/kdc_authdata.c | 3 ++-
3 files changed, 13 insertions(+), 3 deletions(-)
diff --git a/doc/admin/admin_commands/kadmin_local.rst b/doc/admin/admin_commands/kadmin_local.rst
index a291b67..bcae5d4 100644
--- a/doc/admin/admin_commands/kadmin_local.rst
+++ b/doc/admin/admin_commands/kadmin_local.rst
@@ -284,6 +284,15 @@ Options:
**+password_changing_service** marks this principal as a password
change service principal.
+{-\|+}\ **ok_to_auth_as_delegate**
+ **+ok_to_auth_as_delegate** allows this principal to acquire
+ forwardable tickets to itself from arbitrary users, for use with
+ constrained delegation.
+
+{-\|+}\ **no_auth_data_required**
+ **+no_auth_data_required** prevents PAC or AD-SIGNEDPATH data from
+ being added to service tickets for the principal.
+
**-randkey**
Sets the key of the principal to a random value.
diff --git a/doc/admin/conf_files/kdc_conf.rst b/doc/admin/conf_files/kdc_conf.rst
index 3b56e61..3ae8907 100644
--- a/doc/admin/conf_files/kdc_conf.rst
+++ b/doc/admin/conf_files/kdc_conf.rst
@@ -126,8 +126,8 @@ For each realm, the following tags may be specified:
tickets.
**no-auth-data-required**
- Enabling this flag prevents PAC data from being added to
- service tickets for the principal.
+ Enabling this flag prevents PAC or AD-SIGNEDPATH data from
+ being added to service tickets for the principal.
**ok-as-delegate**
If this flag is enabled, it hints the client that credentials
diff --git a/src/kdc/kdc_authdata.c b/src/kdc/kdc_authdata.c
index c029892..731c7d5 100644
--- a/src/kdc/kdc_authdata.c
+++ b/src/kdc/kdc_authdata.c
@@ -1159,7 +1159,8 @@ handle_signedpath_authdata (krb5_context context,
/* No point in including signedpath authdata for a cross-realm TGT, since
* it will be presented to a different KDC. */
- if (!is_cross_tgs_principal(server->princ) &&
+ if (!isflagset(server->attributes, KRB5_KDB_NO_AUTH_DATA_REQUIRED) &&
+ !is_cross_tgs_principal(server->princ) &&
!only_pac_p(context, enc_tkt_reply->authorization_data)) {
code = make_ad_signedpath(context,
for_user_princ,
More information about the cvs-krb5
mailing list