GSSAPI Proxy initiative

Nico Williams nico at
Fri Nov 4 12:42:14 EDT 2011

On Fri, Nov 4, 2011 at 11:30 AM, Adamson, Andy
<William.Adamson at> wrote:
> Well, don't all GSS mechanisms have credentials? We use the UID to map between the RPCSEC_GSS context and the credential, so we don't need to store the credential along side of the context.

The problem is that for some mechs credentials can get huge over time
(e.g., Kerberos ccaches).  Ensuring that all those credentials are
available when we need them in order to reestablish RPCSEC_GSS
contexts with the server so we can WRITE out cached dirty blocks in a
memory pressure situation is... difficult or impossible -- anything we
do to make that possible will be generally brittle.

If the GSS-API gave us a way to extract a "sub-credential" we might
make do, BUT, that's ugly, IMO, and we still have to deal with the
fact that that sub-credential's expiration time might not be
convenient, thus needing extra code to refresh it proactively, and so
on.  I.e., a GSS-based solution to this problem could be a nightmare.
An RPCSEC_GSS-based solution seems trivial by comparison.

> That said, I agree that a light-weight method of re-establishing a context is very appealing.

Not least because any re--auth credential refresh operations will
involve only that client and server.


More information about the krbdev mailing list