Is there a way when using PKINIT to not need any internal list of
principals but to rely on the validity of the certificate to proxy the >certificate identity into the Kerberos ticket?
rCo the KDC need to issue the needed TGT then TGS based on the identity
in the certificate if CRL is OK
Is there a way when using PKINIT to not need any internal list of
principals but to rely on the validity of the certificate to proxy the
certificate identity into the Kerberos ticket?
I know what all of those words are, but I'm unclear what they mean all together. I think you mean _this_ step:
It looks like there is some code in the MIT KDC to perform such
a lookup; the database plugin API contains a function called krb5_db_get_s4u_x509_principal(), which takes a client certificate.
Le 14 mars 2024 |a 21:56, Greg Hudson <ghudson@MIT.EDU> a |-crit :Exactly
On 3/14/24 15:27, Ken Hornstein via Kerberos wrote:
Is there a way when using PKINIT to not need any internal list ofI know what all of those words are, but I'm unclear what they mean all
principals but to rely on the validity of the certificate to proxy the
certificate identity into the Kerberos ticket?
together. I think you mean _this_ step:
I believe Yoann is asking for a KDC configuration where the KDB contains server principal entries (including a krbtgt entry) but no client principal entries. PKINIT does not require client long-term keys, and other client principal fields (except for the name) could be taken from a template entry.
MIT krb5 does not currently have this ability with the built-in KDB modules. It could be done with a custom KDB module, but that module would also have to provide all of the regular KDB functionality for the server principal entries, and the KDB interface isn't designed to be stackable (meaning it isn't trivial to implement an overlay).OK, no overlay is a limitation here indeed, it would have been the best option to mix template based response and internal DB.
Alternatively, I think it would be a relatively simple change to the core KDC code to support this: do_as_req.c:lookup_client() could look up a template at a fixed name (WELLKNOWN/CLIENT-TEMPLATE or something) if the regular client lookup fails, and substitute in the requested name.That's an idea. Branching core product is always a impactful option for the future when it's time to follow main branch evolution, but that could be an option.
Informations about the principal (name and everything) could be
extracted from the certificate. Principal and certificate contains the
same informations.
Other option I wonder is using the LDAP backend to answer dynamic
content (we have an LDAP gateway in our codebase, so we can use it as a backend API between MIT Kerberos and our identity store).
Doing so the main issue would be to know what Kerberos need to write, to handle it.
Le 15 mars 2024 |a 17:17, Greg Hudson <ghudson@mit.edu> a |-crit :Understood!
On 3/15/24 06:15, Yoann Gini wrote:
Informations about the principal (name and everything) could be extracted from the certificate. Principal and certificate contains the same informations.
To issue a ticket, the KDC doesn't need to know directory-type information such as real names, but it does need to know Kerberos-specific policy information like "how long can the ticket expiration time be". That information could presumably be standardized across clients, which is why I suggested a template principal.
OK, thanks!--- Synchronet 3.21d-Linux NewsLink 1.2Other option I wonder is using the LDAP backend to answer dynamic content (we have an LDAP gateway in our codebase, so we can use it as a backend API between MIT Kerberos and our identity store).
Doing so the main issue would be to know what Kerberos need to write, to handle it.
The KDC does not need to write to the KDB, although it will attempt to do writes to maintain account lockout state (which is irrelevant to the configuration at hand). Attempts to write can be disabled via the settings documented here:
https://web.mit.edu/kerberos/krb5-latest/doc/admin/lockout.html#disable-lockout
When synthesizing a client principal entry (or creating a template), be sure to include the KRB5_KDB_REQUIRES_PRE_AUTH and KRB5_KDB_DISALLOW_SVR principal flags.
| Sysop: | Amessyroom |
|---|---|
| Location: | Fayetteville, NC |
| Users: | 64 |
| Nodes: | 6 (0 / 6) |
| Uptime: | 492944:06:08 |
| Calls: | 842 |
| Files: | 1,304 |
| D/L today: |
8 files (19,649K bytes) |
| Messages: | 261,765 |