Re: GSSAPI plugin and kerberos auth-to-local rules

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Carson Gaspar wrote:

Guillaume Rousse wrote:

Hello list.

I recently found than the GSSAPI plugin, used notably in openldap, doesn't honor map-to-local rules, as described at
http://www.openldap.org/lists/openldap-software/200910/msg00010.html

Is it intentional ?

It is intentional, as Kerberos realms and domain parts of usernames for other authentication mechanisms are from different namespaces. I.e., in general case there is no correlation between a realm EXAMPLE.COM and a domain example.com. They can't be treated as the same type of object.

No modern protocol should care. The target username should be transmitted as part of the application protocol - GSSAPI does authentication, not authorization or user name mapping. Yes, MIT krb5 (not GSSAPI) supports hacks using auth_to_local and auth_to_local_names, but only if you call krb5_aname_to_localname(), which is deprecated. I suspect mod_krb is using this deprecated function.

What worries me is that the native realm _is_ stripped. It shouldn't be. I'm not sure why gssapi_server_mech_step() does so.

The native realm is stripped only if it is the default realm. This would be consistent with how non-Kerberos username canonicalization is working.


[Index of Archives]     [Info Cyrus]     [Squirrel Mail]     [Linux Media]     [Yosemite News]     [gtk]     [KDE]     [Gimp on Windows]     [Steve's Art]

  Powered by Linux