Parallel gss_get_mic or gss_wrap results in segfaults in krb5_k_free_key
Nico Williams
nico at cryptonector.com
Thu Apr 27 14:04:18 EDT 2023
On Wed, Apr 19, 2023 at 01:52:52PM -0400, Greg Hudson wrote:
> The majority of the thread-safety work in the MIT krb5 libraries predates my
> tenure and it isn't fully documented, but it looks like there has never been
> a deliberate attempt to make GSS context handles safe when used
> simultaneously in multiple threads. In addition to the use of krb5_key
> objects which (deliberately) aren't internally locked, there is also
> mutation of the sequence numbers and sequence states. I think this hasn't
> come up before because most protocols using GSS message protection are
> inherently sequential, so it rarely makes sense to produce or process
> messages in parallel within a context. But the GSSAPI is intended to
> support non-sequential protocols, so there would be some value in making
> this work.
>
> Heimdal has internally locked context handles, and limits the critical
> section to sequence number handling. Adding a lock to the MIT krb5 context
> structure should be straightforward, but limiting the critical section would
> be harder due to the krb5_key type.
In OpenJDK 21 this will almost certainly cause crashes in Java apps
using the new green thread scheme.
Nico
--
More information about the krbdev
mailing list