certificate revocation check for PKINIT in KDC

tseegerkrb tseegerkrb at gmail.com
Thu Aug 10 06:53:10 EDT 2017


On 10.08.2017 06:55, Greg Hudson wrote:
> On 08/08/2017 02:11 PM, Jim Shi wrote:
>> Is there any document how to configure certificate revocation check for PKINIT in KDC?
> I believe the only documentation we have for this is in the man page for
> kdc.conf, which says:
>
> pkinit_revoke
>   Specifies the location of Certificate Revocation List (CRL)
>   information to be used by the KDC when verifying the validity of
>   client certificates. This option may be specified multiple times.
>
> The CRL file(s) have to be maintained out of band (we do not have OCSP
> support; you might see documentation for a pkinit_kdc_ocsp variable but
> it isn't implemented).  If I read the code correctly, CRL files are only
> read on KDC startup, so the KDC must be restarted to update revoked
> certs.  CRL files are expected to be in PEM format.
> ________________________________________________
> Kerberos mailing list           Kerberos at mit.edu
> https://mailman.mit.edu/mailman/listinfo/kerberos

Hello,
if you set this up, a little warning at least on debian and ubuntu the
option "pkinit_require_crl_checking = true" does not work as expected. 
If it set to true you get the message the certificate status is unknown (or something similar).
So if you can not authenticate with the certs try setting 'pkinit_require_crl_checking' false.
This will deny revoked certificates too.

...
  pkinit_revoke = FILE:/etc/krb5kdc/TNTNET_LOCAL_PKINIT_CA.crl
  #pkinit_revoke = /etc/krb5kdc/
  # If pkinit_require_crl_checking is set to 'true'
  # login always fails
  pkinit_require_crl_checking = false
}

For testing and playing around i made a bash script to install a multimaster kerberos server with openldap backend.
The script setup pkinit too. If you wanna take a look you can find it here: https://wp.tntnet.eu/?p=112

Regards
Thorsten



More information about the Kerberos mailing list