2. A client may not have access to the session keys in its ccache, e.g. if itrCOs using gssproxy.Oops, sorry -- thatrCOs a little off the mark. In that case of course session-key logging wonrCOt help the client directly, since it doesnrCOt perform those operations or call libkrb5 itself at all; the gssproxy daemon does. In that case werCOd apply KRB5KEYLOGFILE to the daemon. But there is a second reason nonetheless: itrCOs easier for debugging. A long-lived client process under observation could have its ccache flushed by ticket renewal or similar management, losing the needed session keys (and a mechanism like gssproxy could in fact have several ccaches it manages) -- whereas setting KRB5KEYLOGFILE would reliably capture them all without extra work.
I have a patch to libkrb5 which implements a feature similar to the SSLKEYLOGFILE environment variable thatrCOs now in pretty wide use for
TLS: it logs session keys to a keytab named by KRB5KEYLOGFILE. The main
use for this, just as with the TLS version, is to decrypt packet
captures with Wireshark; the latterrCOs KRB5 dissector takes a keytab as input.
| Sysop: | Amessyroom |
|---|---|
| Location: | Fayetteville, NC |
| Users: | 64 |
| Nodes: | 6 (0 / 6) |
| Uptime: | 492944:09:17 |
| Calls: | 842 |
| Files: | 1,304 |
| D/L today: |
8 files (19,649K bytes) |
| Messages: | 261,765 |