Proper way to do logging (KDC) from preauth plugin?
Jeff Blaine
jblaine at kickflop.net
Wed Apr 28 11:38:59 EDT 2010
> I think that configuration of which pa types should be required for a
> given user don't belong in a PA_REQUIRED flag.
Reflecting more on it, FWIW, I completely agree. That thought was
really just a desperate attempt to find some immediate way
to make any sort of progress in my project, intentionally
ignoring any long-term relevance or correctness. I may
even continue down that path for the sake of getting
*anything* working the way I need it to in our exploratory
code. (ugh)
> I think if you're looking for a facility to decide whether a particular
> request should be honored that always runs against the request, then you
> would need a new facility. I think designing such a facility will be a
> bit tricky. Using that type of facility for environment-specific
> restrictions seems fine. For example: in our environment, we never want
> to let certain users log in outside of working hours.
>
> However, using such a facility to limit access to specific services
> seems highly problematic from a secure interoperability standpoint. RFC
> 4120 requires services to handle authorization. If some KDCs in some
> environment will handle some of the authorization, but other KDCs in
> other environments do not, then it seems very easy to get a class of
> services that are not interoperable with a general purpose KDC or that
> are not secure when used with such a KDC. I'm strongly against that.
From my part of the conversation, none of this is intended to be
used for authorization. The goal is to require a specific
pre-authentication succeeds before considering the granting of
a TGT (for any intended purpose).
More information about the krbdev
mailing list