password change protocol implementation
John Hascall
john at iastate.edu
Fri Feb 13 18:15:49 EST 2004
> > They never seemed that hard to me, but perhaps I'm
> > missing some subtlety. Certainly it was a lot less
> > trouble than figuring out how to use that GSS glarp.
> > I mean what's so hard about krb5_rd_priv(ctx, actx, &in, &out, NULL);
> Sure, _that_ actual function call isn't hard. It's the tons of crap you have
> to set up to get to that point. For example ...
>
> krb5_auth_con_init(ctx, &actx);
> krb5_auth_con_setflags(ctx, actx, KRB5_AUTH_CON_DO_SEQUENCE);
[optional]
>
> << extract out the IP address of you and your peer, which is
> really the big pain >>
> krb5_auth_con_setaddrs(ctx, actx, ...);
> And then there's the whole lossage that you really only want
> the "local" address on the mk_priv side, and you want the
> "remote" address on the rd_priv side.
Ick. Try just:
krb5_auth_con_genaddrs(ctx, actx, fd, flags);
> So, now ... let's throw in a multihomed server. Let's also throw in
> a connectionless protocol. And if you're behind a NAT ...
I don't see how multihoming makes it harder,
and yes, you'd have to recvfrom if connectionless.
>> But NATs are evil and IPv6 will make them go away, right? (*pleads*) :)
> Hey, I hope so too, but in the meantime ...
John
More information about the krbdev
mailing list