Alternative proxy-creds API for constrained-delegation
Isaac Boukris
iboukris at gmail.com
Wed Jun 3 12:54:01 EDT 2020
On Wed, Jun 3, 2020 at 5:58 PM Nico Williams <nico at cryptonector.com> wrote:
>
> On Wed, Jun 03, 2020 at 02:15:58PM +0200, Isaac Boukris wrote:
> > On Wed, Jun 3, 2020 at 6:53 AM Nico Williams <nico at cryptonector.com> wrote:
> > > Here's the idea:
> > >
> > > - you always get a deleg_cred_handle if one was delegated or S4U2Proxy
> > > is available,
> > >
> > > - you tell gss_store_cred_into() about what you're willing to store and
> > > with what options,
> > >
> > > - if you say "only real creds" then gss_store_cred_into() will not
> > > store S4U2Proxy creds.
> >
> > This sounds a lot of application logic, and we also don't want to
> > implicitly delegate a ticket at this point.
>
> On the contrary, this makes the app simpler because configuration now is
> something of a hole: the app doesn't need to know anything about it, it
> just passes through settings from a config file.
>
> We do this in our sshd already, so it won't need _any_ changes in order
> to use this new configuration parameter.
Not sure I follow, so your sshd won't need any changes, how does that
make it simple for others? And again, we don't want to implicitly
delegate a ticket at this point.
> > btw, we don't have to call it s4u2proxy creds, it's just a tgt-less
> > cache with a service ticket, maybe we could use it in different
> > manners as well (for local auth, or maybe invent a way to authenticate
> > to the kdc with it?).
>
> I'm going to call them S4U2Proxy creds. To me that's what they are. It
> tells me what I need to know: that initiator credentials for the service
> are needed.
That's what they are now, but I think we can make other uses of it as
pointed out.
More information about the krbdev
mailing list