Your message dated Thu, 17 Mar 2011 20:23:08 -0400 (EDT)
with message-id <[email protected]>
and subject line I believe this was fixed in krb5 1.8.3+dfsg-5
has caused the Debian Bug report #567499,
regarding krb5-user: Problem forwarding TGT via ssh
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
567499: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=567499
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: krb5-user
Version: 1.8+dfsg~alpha1-5
Severity: normal


This is actually more of a heads-up than an actual bug report, so please feel 
free to close as "invalid".

We have recently encountered problems with TGT forwarding via ssh from squeeze 
clients to RHEL5 servers. The actual authentication does work so we suspect 
that the TGT either gets malformed or misinterpreted somewhere on the way. This 
seems to be related to the use of AES-256 encryption as a default instead of 
DES in recent versions of kerberos as setting use_weak_crypto to true in 
/etc/krb5.conf seems to solve the problem.

For more details please look at the similarly-not-quite-a-bug-report filled 
against the sshd of RHEL5.
https://bugzilla.redhat.com/show_bug.cgi?id=559866

Unless this turns out to be a clear-cut SSH client bug in "testing" (that would 
get fixed on the next update), the implications might be pretty bad for actual 
production users. Perhaps it is worthwhile to get this debugged and impact 
understood while the new configuration is still in testing.


-- System Information:
Debian Release: squeeze/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.32-trunk-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages krb5-user depends on:
ii  krb5-config            2.2               Configuration files for Kerberos V
ii  libc6                  2.10.2-2          GNU C Library: Shared libraries
ii  libcomerr2             1.41.9-1          common error description library
ii  libgssapi-krb5-2       1.8+dfsg~alpha1-5 MIT Kerberos runtime libraries - k
ii  libgssrpc4             1.8+dfsg~alpha1-5 MIT Kerberos runtime libraries - G
ii  libk5crypto3           1.8+dfsg~alpha1-5 MIT Kerberos runtime libraries - C
ii  libkadm5clnt-mit7      1.8+dfsg~alpha1-5 MIT Kerberos runtime libraries - A
ii  libkeyutils1           1.2-12            Linux Key Management Utilities (li
ii  libkrb5-3              1.8+dfsg~alpha1-5 MIT Kerberos runtime libraries
ii  libkrb5support0        1.8+dfsg~alpha1-5 MIT Kerberos runtime libraries - S
ii  libss2                 1.41.9-1          command-line interface parsing lib

krb5-user recommends no packages.

krb5-user suggests no packages.

-- no debconf information



--- End Message ---
--- Begin Message ---

Krb5 managed to break delegation in the 1.8 series. It sort of mostly worked 
delegating from MIT to MIT Kerberos but other combinations were not so lucky.
I suspect that's what is going on here.
If you can still reproduce please reopen the bug, but I'm moderately sure this 
is fixed.


--- End Message ---

Reply via email to