[krbdev.mit.edu #3206] gss_acquire_cred with GSS_C_BOTH or GSS_C_INITIATE should work with keytab creds

pcmoore@sandia.gov via RT rt-comment at krbdev.mit.edu
Wed Oct 5 17:24:10 EDT 2005


Sam Hartman (see below) suggested I report this as a bug. It has been
there
for a long time, and I understand Heimdal does not have this problem.

Synopsis: When a cred cache is not available, and a keytab cred is 
available, gss_acquire_cred should obtain an initiator cred cache
based on the keytab cred when GSS_C_BOTH or GSS_C_INITIATE flag is set.

See RFC 1964, June 1996, Section 3
fourth paragraph.

Severity:  
Probably not high, because there is
a somewhat kludgy workaround that many of us use:
run a cron or background process that repeatedly generates a
cred cache from a keytab. 
(e.g., "kinit -k -t" or API equivilent)


> -----Original Message-----
> From: Sam Hartman [mailto:hartmans at mit.edu] 
> Sent: Tuesday, October 04, 2005 3:15 PM
> To: Moore, Patrick
> Cc: krbdev at MIT.EDU
> Subject: Re: gss_acquire_cred with GSS_C_BOTH usage option
> 
> >>>>> "Moore," == Moore, Patrick <pcmoore at sandia.gov> writes:
> 
>     Moore,> My reading of RFC1964, where it says . . .
> 
>     Moore,>    "However, when the Kerberos 5 mechanism attempts to
>     Moore,> obtain initiating credentials for a service principal
>     Moore,> which are not available in a credentials cache, and the
>     Moore,> key for that service principal is available in a Kerberos
>     Moore,> 5 key table, the mechanism should use the service key to
>     Moore,> obtain initiating credentials for that service."
> 
>     Moore,> ... implies that Heimdal has the right approach.
> 
> You're completely right.  Would you mind opening a bug by 
> describing the problem in mail to krb5-bugs at mit.edu.  Please 
> include a RFC 1964 reference.
> 
> --Sam
> 
> 
> 





More information about the krb5-bugs mailing list