Services4User review
Nicolas Williams
Nicolas.Williams at sun.com
Thu Aug 20 16:46:15 EDT 2009
On Thu, Aug 20, 2009 at 10:33:06PM +0200, Luke Howard wrote:
> >Delegated credential handles need not correspond to delegated
> >credentials in the RFC1964/4121 sense, nor should it be necessary that
> >the caller of GSS_Init_sec_context() have explicitly requested
> >credential delegation -- in the S4U2{Self,Proxy} the delegation is
> >specified in the authz-data of the initiator's service Ticket, and the
> >decision to delegate could be made by the KDC.
>
> I'm not sure if I understand this: could you point me to where in [MS-
> SFU] it says that delegation is specified in the authorization data of
> the initiator's service ticket?
Oh, forget the authz-data thing -- clearly it's the whole of the
initiator's service Ticket that matters (the KDC might use authz-data in
it, but that's another story). Excuse the brain-fart.
> > [proposal and two wrinkles]
>
> In practice I'm not sure if this is a big issue. In the current
> implementation unconstrained delegation (ie. forwarded credentials)
> take precedence.
Sure.
> >- Let gss_accept_sec_context() always output a delegated cred handle
> >in
> > the krb5 case, even when there's no traditional credential
> >delegation
> > on the part of the initiator. Let gss_store_cred() fail if there's
> > no traditional "forwarded Ticket" in the delegated credential.
>
> Note we don't have gss_store_cred() yet.
We do. It's useful, though really only in sshd :)
> >- For S4U2Proxy add gss_acquire_cred_impersonate_deleg() with two
> > credential handle inputs:
> >
> > - service_cred_handle (the caller's own cred handle)
> > - subject_cred_handle (the delegated credential whose subject is to
> > be impersonated)
> >
> > and let it output a new cred handle corresponding to "the subject as
> > impersonated by the service".
>
> Where does one specify the service to which to delegate to? Would that
> be another input?
That would be the target_name from the subsequent gss_init_sec_context()
call.
> >Also, are you sure that there are no non-GSS-API applications where
> >S4U2{self,Proxy} might be needed?
>
> I'm not sure, but I think for 1.8 I'd prefer to expose at GSS-API
> first, and then for a future release we can think about exposing the
> underlying krb5 APIs. I don't feel too strongly about this though.
Sure.
> How do others feel about this? The proposed changes seem reasonable to
> me. One change is that I was initially planning to make these
> mechanism-specific APIs; do we want to commit to introducing new
> mechanism-agnostic APIs?
I think these should be mechanism-agnostic. A PKIX equivalent for
constrained delegation and impersonation is easily imaginable.
Nico
--
More information about the krbdev
mailing list