capaths questions
Nicolas Williams
Nicolas.Williams at sun.com
Tue May 18 12:18:11 EDT 2004
On Tue, May 18, 2004 at 11:06:49AM -0500, Douglas E. Engert wrote:
>
> Nicolas Williams wrote:
> >
> > On Tue, May 18, 2004 at 10:50:06AM -0400, Jeffrey Altman wrote:
> > > Here is my take on the situation:
> > >
> > > 1. The current requirement that all paths be specified is too
> > > complicated for the most common cases in which the recursive path
> > > traversal in the client would be just fine. Therefore, I would
> > > like to see recursive path traversal be used when an explicit path
> > > is not specified.
> >
> > Path validation needs a better language that does not require full path
> > specification.
> >
> > I imagine, for example, a language where one can say "not through COM
> > from *.FOOBAR.COM," "two-hops max from *.FOO.COM," "hierarchical
> > transits, but not through TLR (top-level realm), shortcuts in hierarchy
> > traversal allowed from FOO.COM," etc...
> >
>
> This is boggling to the mind!
It's actually quite simple since most folk will get by with a default
rule allowing for any transited path and those who don't will generally
have a few such rules.
> I would expect one goal it to keep it simple, so the client and server
> can each derive the same path, so as to check the transited field.
Specifying exceptions is simpler than specifying all valid paths!
> Referrals and the server's setting of the TRANSITED-POLICY-CHECKED
> are designed to make life simpler for the clients and servers, and
> let their KDCs do some of the work, yet let the client or service do
> all the work if they want.
But the KDC still needs a policy.
> I am not sure if these rules make things any simpler to understand and
> implement correctly.
I think they do.
> > Rules would have two parts: one matching client principal realm names
> > (using some sort of expression, globs, regexes or just the simple
> > domain_realm '.' matching) the other one listing restrictions.
> >
> > These rules should be applicable per-realm, per-principal and/or per-
> > application profile.
> >
> > The client also need not have a complete database of x-realm paths; a
> > list of shortcuts should suffice (i.e., always do hierarchical x-realm
> > transitting modulo shortcut availability).
> >
> > > 2. KDC checking of the transitive path should be optional. I like
> > > Doug's suggestion of the NO_KDC_CHECK and KDC_CHECK_ALL bits. In
> > > general I believe that the final determination of whether a path
> > > should be accepted or not is the responsibility of the application
> > > service. Of course, if there are certain paths that a realm
> > > administrator does not want to trust it should be able to prevent
> > > the KDC from issuing service tickets. But it should be an option
> > > and not a requirement.
> >
> > Yes, I too like Doug's proposal, though I might name the bits
> > differently:
> >
> > - TRANSIT_CHECK_REJECTIONS (reject unacceptable paths, but don't set
> > transited policy checked bit on issued tickets)
> >
> > - TRANSIT_CHECK_ALL (reject unacceptable paths, set transited policy
> > checked bit on issued tickets)
> >
>
> This is not protocol, but database administration, much like the
> OK-TO-DELAGATE that some systems support.
Yes. My point stands.
Nico
--
More information about the krbdev
mailing list