1.6.1 breaks ability for applications to specify enctypes
Ken Raeburn
raeburn at MIT.EDU
Sun Apr 29 16:39:22 EDT 2007
The conflict you described:
> I suspect the referrals code interacts badly with use_conf_ktypes or
> something like that.
>
> I actually don't see how referrals could work well with
> use_conf_ktypes because I think they have conflicting requirements.
should be examined further, even if it's not the root cause of this
particular problem.
The etype list included in the TGS request indicates the types of
session key that are desired, whether because of application protocol
restrictions or configuration policies or some other reason. In the
referral case, we get back a TGT to be used to acquire the service
ticket, and the application protocol restrictions don't apply, so we
don't need or want to impose the same etype list limitation. And, in
fact, the cross-realm TGT principal may have a restricted set of key
types that has an empty intersection with the application protocol
etype list.
Is this a fair summary of the conflict as you see it?
A similar issue could come up with the AS exchange in certain
configurations. Consider a site where user accounts have AES keys
only, you want to talk to a service that requires a DES session key,
and you only want to talk to that one service so you don't need a
TGT. If you send an etype list that includes only DES key types,
that list also gets applied to the selection of which key is used
from the database entry for the user, which has only AES, so no
matching key is found. But in this situation, the exchange should be
able to use the user's AES key and establish a DES session key.
One approach might be, when referrals are permitted, to build an
etype list with the etypes acceptable under the application protocol
restrictions at the front, and the other enctypes that we can accept
in TGTs at the end. That will allow a TGT to be returned with an
etype not supported by the application protocol, if the KDC treats
this as a prioritized list. It has a couple of obvious drawbacks:
(1) If the cross-realm TGT keys support both some weaker etypes
needed by the application protocol and some stronger etypes, the
weaker type would be used. If the TGT is only used to get the
service ticket and then discarded, that would probably be acceptable;
less desirable if we actually cache it and use it for getting other
tickets (even for the same service principal under a different
application protocol).
(2) We could get back a service ticket of a type not supported by the
application protocol. This should only happen if the service
principal's entry in the database indicates that the desired etypes
aren't actually supported by the service (which, given the
application protocol restrictions, means that application protocol
isn't supported, and the client is apparently trying to get tickets
before figuring out if the server will support it). So the library
code should check the etype returned and generate the appropriate
error if needed.
However, I should note that I don't think RFC 4120 explicitly says
the TGS treats the etype list as a prioritized list. It is explicit
about the AS case.
So, if the above won't work in the TGS case, if we get an error back
because the etype lists don't intersect, we could submit another
request for the service ticket without the (more) restricted etype
list, and use the final cross-realm TGT to re-request a service
ticket with the restricted etype list.
Ken
More information about the krbdev
mailing list