[krbdev.mit.edu #2641] KRB5_KDB_DISALLOW_SVR flag unnecessari ly prevents User2User
pcmoore@sandia.gov via RT
rt-comment at krbdev.mit.edu
Thu Jul 22 16:15:47 EDT 2004
I agree that the proposed fix would cause a
subtle change of KDC behavior, but like Ken,
I can't imagine that it would catch anyone
by surprise. And the fix is a really
important security feature to any site that needs
to allow user2user, and to require preauthentication.
Text could be added to the
release notes that this fix allows user2user
tickets for principals that are set
-allow_svr (which was not the case in
previous KDCs)
I also think the documentation could be
made more clear.
Below are four suggested changes
to doc/admin.texinfo
1)---------------------------
OLD admin.texinfo:
@itemx dup-skey
Enabling this flag allows the principal
to obtain a session key for
another user, permitting user-to-user
authentication for this principal.
NEW admin.texinfo:
@itemx dup-skey
Enabling this flag allows the KDC to
issue a user-to-user service ticket
for this principal.
2)--------------------
OLD admin.texinfo:
@itemx service
Enabling this flag allows the KDC
to issue service tickets for this
principal.
NEW admin.texinfo:
Enabling this flag allows the KDC
to issue service tickets for this
principal that contain text encrypted
in the principal's key, which may
be a security issue.
3) -------------------------
OLD admin.texinfo:
@item @{-|+@}allow_dup_skey
The ``-allow_dup_skey'' option disables
user-to-user authentication for
this principal by prohibiting this
principal from obtaining a session
key for another user.
``+allow_dup_skey'' clears this flag.
In effect,``-allow_dup_skey'' sets
the @* KRB5_KDB_DISALLOW_DUP_SKEY flag on the
principal in the database.
NEW admin.texinfo:
@item @{-|+@}allow_dup_skey
The ``-allow_dup_skey'' option disables
user-to-user authentication for
this principal by prohibiting others
from obtaining a service ticket encrypted
in this principal's TGT session key.
``+allow_dup_skey'' clears this flag.
In effect,``-allow_dup_skey'' sets the
@* KRB5_KDB_DISALLOW_DUP_SKEY flag on the
principal in the database.
4) -------------------------------------
OLD admin.texinfo:
@item @{-|+@}allow_svr
The ``-allow_svr'' flag prohibits the issuance
of service tickets for this principal.
``+allow_svr'' clears this flag. In effect,
``-allow_svr'' sets the
@* KRB5_KDB_DISALLOW_SVR flag on the
principal in the database.
NEW admin.texinfo:
@item @{-|+@}allow_svr
The ``-allow_svr'' flag prohibits the issuance
of service tickets for this principal
that contain text encrypted in the
principal's key. Failing to set ``-allow_svr``
on user principals may be a security issue.
``+allow_svr'' clears this flag. In effect,
``-allow_svr'' sets the
@* KRB5_KDB_DISALLOW_SVR flag on the
principal in the database.
More information about the krb5-bugs
mailing list