Actually, if I have KRB5CCNAME set to a file in /tmp, and kinit as someone 
else, e.g. admin, that will reinitialize the file in /tmp, losing my original 
credentials.

With KEYRING (I’m using Centos 7), because it’s a collection, there’s some hope 
of maintaining multiple caches properly. If KRB5CCNAME is set to the 
collection, kinit is smart enough to create a new credentials cache. With 
FILE:, I’d need to reset KRB5CCNAME or using an explicit -c option to kinit. 
The problem is that kinit makes the new cache primary. Without NFS that makes 
sense. With NFS, it can cause trouble.

I see two reasonable solutions:

 * Have rpc.gssd look at the whole KEYRING collection and not just the primary. 
I don’t think that’s a hard patch, though having GSSAPI on top of Kerberos 
makes everything more difficult to figure out.
* Have the primary member of the collection be session-specific. But you’d 
probably need to combine that with the first.

I’m thinking of generating a bug report for rpc.gssd.

On Mar 16, 2017, at 12:26 PM, Jason L Tibbitts III 
<ti...@math.uh.edu<mailto:ti...@math.uh.edu>> wrote:

CH> About the best I could come up with is to wrap kinit with a script
CH> that sets KRB5CCNAME to KEYRING:persistent:NNN before doing kinit,
CH> so it always works.

I would suggest just using FILE: so there's no chance of the admin
CCACHE messing with your user credentials.

________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to