ccache using linux keyring

Sam Hartman hartmans at MIT.EDU
Thu Apr 14 11:19:44 EDT 2005


>>>>> "Kevin" == Kevin Coffman <kwc at citi.umich.edu> writes:

    >> >>>>> "Jeffrey" == Jeffrey Hutzelman <jhutz at cmu.edu> writes:
    >> 
    Jeffrey> On Wednesday, April 13, 2005 12:40:50 PM -0400 Kevin
    Jeffrey> Coffman
    Jeffrey> <kwc at citi.umich.edu> wrote:
    >>  >> The current implementation uses a new keyring created in
    >> the >> session-specific keyring (KEY_SPEC_SESSION_KEYRING) to
    >> >> represent a user's credentials cache file.  The principal >>
    >> information and each ticket are stored in this keyring as an >>
    >> individual key.  The name of the keyring matches the 'residual'
    >> >> name as passed to the resolve function and found in
    >> KRB5CCNAME.  >> The principal information is kept in a key
    >> named 'krb5_princ' >> and each ticket is kept in a sequentially
    >> numbered key >> 'krb5tkt_000000', etc.  (These individual key
    >> names are just >> for reference, their key_serial is what is
    >> really kept track >> of.)
    >> 
    Jeffrey> Why not name them for the service principal?
    >>  I'm concerned that there may be circumstances where you want
    >> to have duplicate or semi-duplicate tickets.  I'm concerned
    >> that other ccache types do not work this way and it seems
    >> dangerous to have different semantics.

    Kevin> I'm not sure I understand your concern.  From the user-land
    Kevin> Kerberos library view, this should look like any other
    Kevin> ccache type.

Jeff is proposing having different semantics (being able to store only
one ticket per service principal) than other ccaches.



More information about the krbdev mailing list