Rocksolid Light

Welcome to RetroBBS

mail  files  register  newsreader  groups  login

Message-ID:  

That wouldn't be good enough. -- Larry Wall in <199710131621.JAA14907@wall.org>


devel / comp.protocols.kerberos / Re: Kerberos PAC decoding support

SubjectAuthor
o Re: Kerberos PAC decoding supportKen Hornstein

1
Re: Kerberos PAC decoding support

<mailman.90.1692896571.1964.kerberos@mit.edu>

  copy mid

https://www.rocksolidbbs.com/devel/article-flat.php?id=373&group=comp.protocols.kerberos#373

  copy link   Newsgroups: comp.protocols.kerberos
Path: i2pn2.org!i2pn.org!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!tncsrv06.tnetconsulting.net!.POSTED.mailman.mit.edu!not-for-mail
From: kenh@cmf.nrl.navy.mil (Ken Hornstein)
Newsgroups: comp.protocols.kerberos
Subject: Re: Kerberos PAC decoding support
Date: Thu, 24 Aug 2023 13:01:54 -0400
Organization: TNet Consulting
Lines: 20
Message-ID: <mailman.90.1692896571.1964.kerberos@mit.edu>
References: <TYCPR01MB118471D443B42094302C80091D91DA@TYCPR01MB11847.jpnprd01.prod.outlook.com>
<202308241701.37OH1sRS015050@hedwig.cmf.nrl.navy.mil>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Injection-Info: tncsrv06.tnetconsulting.net; posting-host="mailman.mit.edu:18.7.21.50";
logging-data="6253"; mail-complaints-to="newsmaster@tnetconsulting.net"
Cc: "kerberos@mit.edu" <kerberos@mit.edu>
To: Ondrej Valousek <ondrej.valousek.xm@renesas.com>
Authentication-Results: mit.edu; dmarc=pass (p=reject dis=none)
header.from=cmf.nrl.navy.mil
Authentication-Results: mit.edu; arc=pass smtp.remote-ip=18.9.3.17
ARC-Seal: i=2; a=rsa-sha256; d=mit.edu; s=arc; t=1692896570; cv=pass;
b=oHgzWjeUDCTI5i3FHNfq9R3C995GUSSQPQRdWi2dcyewpY0/jBBcbgve46/UjVZHA/tFhIrdFt0XNhqg+/XKBbYihvTRDP+ceswrQeNm89TQ4FT3uSMxOGI+pIYe5ciM2j5RVGImBKdFaTtB2fn8qEy53NPe/c1ISOQYD3w2xujQgmNhQYDIhBrE7cIgAZEFkyQA9ePc20VkIT3Od1T7ckmlIy0otnnLLrDKpnvQTWaecEB2haa3JujPkofCCaMpwDtr0Uk0IIiZ/d/H3ZJNsCmQIGqrNDGkJNi/SNVwg7yi9t4ucfdp1x2WxNTk8Drbm3xZWliib1oH12lNngMaqQ==
ARC-Message-Signature: i=2; a=rsa-sha256; d=mit.edu; s=arc; t=1692896570;
c=relaxed/relaxed; bh=PAzIa2R0S4MWcBBV7IFjQKae1UyjKHtP5Aam/GBoNvs=;
h=Message-ID:From:Subject:MIME-Version:Content-Type:Date;
b=UeL4uhox5kuHoYdC6/LKHuJvfTUv4xOrOCGfqR1m0Maru7P5wVqPabpv3XZUv5EZnAWUGQxfMNco2HBAABxvHjA9z9n2chYcCtCrCFueCs7ia/y0/+8hSgL3U8b8C4eNMPcIFSBCkSAmYpW+37RqZXKcjVlmKr9ygmOuuarjqwJlCU2wPSJxhtGQ/X4Ig+VNw2FKn2axKhR7EKjXFBDw03DBHLZm6Rrnlji1NSkdplMUYmW1Szy3oLhWlwaKYltDda9UCSJnCO0pLf/J2cxanB5VTdPbB+6e2cAMopf5bQeOqgh5CrE+VC1+p7sbpYetyJ8nJBboTcSt9bjFn+CpYg==
ARC-Authentication-Results: i=2; mit.edu; dkim=pass (1024-bit key;
unprotected) header.d=mitprod.onmicrosoft.com
header.i=@mitprod.onmicrosoft.com header.a=rsa-sha256
header.s=selector2-mitprod-onmicrosoft-com header.b=FjAaRvTM;
dkim=pass (2048-bit key;
unprotected) header.d=nrl.navy.mil header.i=@nrl.navy.mil header.a=rsa-sha256
header.s=s2.dkim header.b=mQggurbk
Authentication-Results: mit.edu; dkim=pass (1024-bit key;
unprotected) header.d=mitprod.onmicrosoft.com
header.i=@mitprod.onmicrosoft.com header.a=rsa-sha256
header.s=selector2-mitprod-onmicrosoft-com header.b=FjAaRvTM;
dkim=pass (2048-bit key;
unprotected) header.d=nrl.navy.mil header.i=@nrl.navy.mil header.a=rsa-sha256
header.s=s2.dkim header.b=mQggurbk
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
b=OGxO6XpG7ZFnQE9ArMDlf//VPz88ed0svK9O2ZfV/Nppqw4COLw5TymHYCzLdUgTiljSx2WhiKXw3/YaxvyCSlmzrE0eQr73f0yHEDyHsxQr9UxqM0LH/XDLnKbi/sme7V/HRmAavNdefgzL1ggWpgGZw/z+FFYQjyfntV1MyArt3DksiRtZSdZZO6B0kUvACFSJ4+M2PdvpOoGhepVslVVjAJb0ToDHJgCn+AO1fJ3KdxwMqs7wV7mYLr+FmavyRJefqHaRnoPvjgaJKqJxSsBtjBlNDMg27/BpHRu+jL1o5yuuKBd0xS36l3tvwtqx3fhauoHrclzHFVBsWxFwKw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
s=arcselector9901;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
bh=PAzIa2R0S4MWcBBV7IFjQKae1UyjKHtP5Aam/GBoNvs=;
b=gbxJJ/CA0Z0/bREDf8tTQOrVhvnow0Zvg5mX7jkQBWOJNTMrV6oaTsYkeFwG0kpljk0yrUZw5OVmUBiUgteaXPrMu0URZJ17IByrNQdAqHrXusT1Uulso7oRqO/Px0WIjm8+YUgOz5hrNgZYBuDdmNFpRYgmQKeSJn7gmNdcH+j56e17E+RZ7xP8w2Civv96eLDSF7Szgxztu1BU5sPJIeoqaiIg6gytKPNKmKusr3kNUzMNPRkje6qvAwj+RaS3Brxoyb1YCI0BycHhECP7xuMTIyusK/shca2t7xiU1pQ8uwxQNVon0ghoEu9njEbXtaahpumjqH+bnfJHMVv0EQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=temperror (sender ip
is 140.32.59.234) smtp.rcpttodomain=mit.edu
smtp.mailfrom=cmf.nrl.navy.mil;
dmarc=pass (p=reject sp=reject pct=100) action=none
header.from=cmf.nrl.navy.mil; dkim=pass (signature was verified)
header.d=nrl.navy.mil; arc=none (0)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=mitprod.onmicrosoft.com; s=selector2-mitprod-onmicrosoft-com;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
bh=PAzIa2R0S4MWcBBV7IFjQKae1UyjKHtP5Aam/GBoNvs=;
b=FjAaRvTMwTVD6RpAUekq2t6QIGLfD3A/PC052SE27z2EohDzpibrskUWHOxR6FZTGMUV4VtdzJ/6xTb73AMeHgsgpDDzSiYJmKiQ1UFSFdYvH0iaRV/ubYWU2uaE1pMSUyas/LKmvoN5XicTTDYlK65eY/83VayyjkB3Z4gzkuA=
Authentication-Results: spf=temperror (sender IP is 140.32.59.234)
smtp.mailfrom=cmf.nrl.navy.mil; dkim=pass (signature was verified)
header.d=nrl.navy.mil;dmarc=pass action=none header.from=cmf.nrl.navy.mil;
Received-SPF: TempError (protection.outlook.com: error in processing during
lookup of cmf.nrl.navy.mil: DNS Timeout)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nrl.navy.mil;
h=message-id : from :
to : cc : subject : in-reply-to : references : mime-version : content-type
: date; s=s2.dkim; bh=PAzIa2R0S4MWcBBV7IFjQKae1UyjKHtP5Aam/GBoNvs=;
b=mQggurbkKTHYX1Qol28S6rp27H60xuQk/qptgsbHFErO0rDo4+12ie+4HtxZXEaUIgOv
26T5ceYgNOdouJOxwoaVO8G9mzQgDkNDOdrGnSaadheXHx9VcI8dfZhXYHIsteb8bejP
H8R2Y4SnApjVGlUaiobCQuUvHApfxICVMOrZikmydKAAh3RTZUPdqsnFzeyExJxY/LeP
mtz+jkHeEEC4KyAVSxtpUU1qIeWACvpjxttnyESNFX34Lzk87obp5qJtTrnfKwjJgsAY
pdUPGdnAhXMtypbVIAoYQbrbM3v+ayIQTEOMPxlr3dY9RG1/V72Qox1Rsonf8thppwPG Dg==
In-Reply-To: <TYCPR01MB118471D443B42094302C80091D91DA@TYCPR01MB11847.jpnprd01.prod.outlook.com>
X-Face: "Evs"_GpJ]],xS)b$T2#V&{KfP_i2`TlPrY$Iv9+TQ!6+`~+l)#7I)0xr1>4hfd{#0B4
WIn3jU;bql;{2Uq%zw5bF4?%F&&j8@KaT?#vBGk}u07<+6/`.F-3_GA@6Bq5gN9\+s;_d
gD\SW #]iN_U0 KUmOR.P<|um5yP<ea#^"SJK;C*}fMI;Mv(aiO2z~9n.w?@\>kEpSD@*e`
X-NRLCMF-Spam-Score: () hits=0 User Authenticated
X-NRLCMF-Virus-Scanned:
X-EOPAttributedMessage: 0
X-EOPTenantAttributedMessage: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b:0
X-MS-PublicTrafficType: Email
X-MS-TrafficTypeDiagnostic: CO1PEPF000044FC:EE_|CH0PR01MB7186:EE_
X-MS-Office365-Filtering-Correlation-Id: 9c9e2d5f-ed2d-488c-fd95-08dba4c3d273
X-LD-Processed: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b,ExtAddr
X-MS-Exchange-AtpMessageProperties: SA
X-MS-Exchange-SenderADCheck: 0
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:140.32.59.234; CTRY:US; LANG:en; SCL:1; SRV:;
IPV:NLI; SFV:NSPM; H:mf.dren.mil; PTR:mfe.dren.mil; CAT:NONE;
SFS:(13230031)(4636009)(376002)(39860400002)(396003)(136003)(346002)(48200799006)(61400799006)(451199024)(1076003)(956004)(5660300002)(4326008)(8676002)(6862004)(4743002)(336012)(426003)(4744005)(63350400001)(83380400001)(3480700007)(26005)(356005)(7636003)(68406010)(70586007)(786003)(316002)(966005)(498600001)(2906002)(86362001);
DIR:OUT; SFP:1102;
X-Auto-Response-Suppress: DR, OOF, AutoReply
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 24 Aug 2023 17:01:55.7264 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 9c9e2d5f-ed2d-488c-fd95-08dba4c3d273
X-MS-Exchange-CrossTenant-Id: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b
X-MS-Exchange-CrossTenant-AuthSource: CO1PEPF000044FC.namprd21.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: Internet
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH0PR01MB7186
X-OriginatorOrg: mitprod.onmicrosoft.com
X-BeenThere: kerberos@mit.edu
X-Mailman-Version: 2.1.34
Precedence: list
List-Id: The Kerberos Authentication System Mailing List <kerberos.mit.edu>
List-Unsubscribe: <https://mailman.mit.edu/mailman/options/kerberos>,
<mailto:kerberos-request@mit.edu?subject=unsubscribe>
List-Archive: <http://mailman.mit.edu/pipermail/kerberos/>
List-Post: <mailto:kerberos@mit.edu>
List-Help: <mailto:kerberos-request@mit.edu?subject=help>
List-Subscribe: <https://mailman.mit.edu/mailman/listinfo/kerberos>,
<mailto:kerberos-request@mit.edu?subject=subscribe>
X-Mailman-Original-Message-ID: <202308241701.37OH1sRS015050@hedwig.cmf.nrl.navy.mil>
X-Mailman-Original-References: <TYCPR01MB118471D443B42094302C80091D91DA@TYCPR01MB11847.jpnprd01.prod.outlook.com>
 by: Ken Hornstein - Thu, 24 Aug 2023 17:01 UTC

>I am wondering if it is reasonable to request the MIT library to
>support PAC decoding (possibly in form of Named Attributes) so that the
>information there could be used in calling application, I.e.:
>
>https://github.com/gssapi/mod_auth_gssapi/issues/288#issuecomment-1690541858
>
>Is something like this reasonable? If yes, is this support planned in
>forthcoming releases of MIT Kerberos library?

I _think_ that's already there? If you're using the GSSAPI you already
have support for named attribute retrieval, as detailed here:

https://web.mit.edu/kerberos/krb5-devel/doc/appdev/gssapi.html

I know there is already extensive PAC decoding and validation in later
MIT Kerberos versions. But I would caution you that like Simo mentioned
I think all you get is SIDs in the PAC and you have to do some more work
to turn that into something useful.

--Ken

1
server_pubkey.txt

rocksolid light 0.9.8
clearnet tor