GSSAPI security context integrity check

Alexandr Nedvedicky alexandr.nedvedicky at
Sun Jun 28 02:17:16 EDT 2020

On Fri, Jun 26, 2020 at 11:38:10AM -0400, Greg Hudson wrote:
> On 6/26/20 4:10 AM, Alexandr Nedvedicky wrote:
> > Once issue was understood the fix is straightforward.  The export/import
> > process must serialize security context such it will be compatible with kernel
> > mechanism (turn seqstate to order). And vice-versa import process must turn
> > order to seqstate. End of story.
> Thanks for the update; it provides a lot of useful context.
> We have periodically talked about radically changing how gss-krb5
> security contexts are exported and imported, most likely accompanied by
> a written specification.  That would let us rip out the libkrb5
> serialization code (which isn't up to current standards), perhaps share
> a token format with Heimdal, and most likely reduce the token size
> significantly.
> It sounds like if we did this work, it would create a significant amount
> of work for Oracle, which would have to either translate the new format
> to the kernel format, or adapt the import code to the kernel.  On the
> other hand, if the new format is stable and/or versioned, it might help
> to prevent subtle bugs like this one--which was caused by a change to
> the export token format without any accompanying versioning.

    To be honest I had no time to figure out all details around
    krb5 kernel mechanism in Solaris. I was thinking about updating the
    kernel mechanism with newer bits from upstream. But I feel kind of
    scared to do it. There is just NFS test suite, which provides coverage
    and I'm just afraid it might not be enough.  The resources are bit
    stretched these days. It used to be 4-5 developers to take care of one
    component such as kerberos. The ratio is kind of inverted after all lay
    offs in our org.

    I think 'significant work for Oracle' should not matter. If the API
    will provide some extra belts. This particular bug was sitting there
    waiting to bite us for almost 5 years without being noticed.

thanks and

More information about the krbdev mailing list