krb5kdc pausing while kdb5_util dumps database

2014-04-25 Thread Kenneth MacDonald
We have a (large?) principal database that takes forty seconds to dump with kdb5_util. While this is going on krb5kdc stops responding to authentication and ticket requests. It happily continues once the dump is complete. We are running MIT krb5 1.12.1 on Scientific Linux 6. Incremental

Storing user-defined attributes in Kerberos5?

2014-04-25 Thread Wendy Lin
Does Kerberos5 have the ability to store user-defined attributes somehere and distribute them to the Kerberos5 clients? Wendy Kerberos mailing list Kerberos@mit.edu https://mailman.mit.edu/mailman/listinfo/kerberos

Re: krb5kdc pausing while kdb5_util dumps database

2014-04-25 Thread Carlos Más
I have experienced this issue before in a similar manner (we do a regular dump of a very large Kerberos database, and the Kerberos process would stop serving requests while this dump was happening). We solved this problem by completely disabling account lockout and access tracking, i.e.:

Re: krb5kdc pausing while kdb5_util dumps database

2014-04-25 Thread Kenneth MacDonald
On Fri, 2014-04-25 at 09:52 -0400, Carlos Más wrote: I have experienced this issue before in a similar manner (we do a regular dump of a very large Kerberos database, and the Kerberos process would stop serving requests while this dump was happening). We solved this problem by completely

Re: krb5kdc pausing while kdb5_util dumps database

2014-04-25 Thread Brandon Allbery
On Fri, 2014-04-25 at 15:05 +0100, Kenneth MacDonald wrote: Thinking aloud ... I wonder how difficult it would be to have krb5kdc optionally stop recording failures while the database is locked. FWIW, Heimdal uses a transaction log, like a real database manager. Changes go into the log and can

Re: krb5kdc pausing while kdb5_util dumps database

2014-04-25 Thread Greg Hudson
On 04/25/2014 10:05 AM, Kenneth MacDonald wrote: Thinking aloud ... I wonder how difficult it would be to have krb5kdc optionally stop recording failures while the database is locked. The database is frequently locked for short periods of time, so I think this would make failure recording

Re: Windows KDC - Delegation Option

2014-04-25 Thread Ben H
Sorry to trudge up a thread a couple of months old - but I believe that the behavior I'm seeing is directly related to this and instead of coming in grasping at straws, I decided it would be best to use this as context. I have a heterogeneous environment with a windows KDC which both my user and

Re: Windows KDC - Delegation Option

2014-04-25 Thread Vipul Mehta
Your understanding is correct but credential delegation requirements are API dependent instead of platform. For Unix : Putty uses MIT Kerberos - GSS API. When you enable delegation in putty it requests GSS_C_DELEG_FLAG instead of GSS_C_DELEG_POLICY_FLAG which doesn't check ok_as_delegate_flag,

Re: Windows KDC - Delegation Option

2014-04-25 Thread Greg Hudson
On 04/25/2014 06:04 PM, Ben H wrote: 04/25/14 16:34:02 04/26/14 02:31:06 host/centos64-01.mydomain.local@ Flags: FA 04/25/14 16:34:02 04/26/14 02:31:06 host/centos64-01.mydomain.local@MYDOMAIN.LOCAL Flags: FA These are the same ticket cached under two different

Re: Windows KDC - Delegation Option

2014-04-25 Thread Ben H
Great - thanks Greg - beginning to be much clearer. So the TGT from B is actually a full request for the forwardable ticket (not just a notification) and it gets sent right to the remote machine and not cached locally. I can confirm this with the issued time stamp not changing on the host, but

Re: Windows KDC - Delegation Option

2014-04-25 Thread Greg Hudson
On 04/25/2014 07:16 PM, Ben H wrote: Is there some way to show a mapping that these two tickets are really identical? In theory it would be possible to checksum the tickets and tell that they are the same, but list doesn't know how to do this. Is the empty realm display really necessary once

Re: Windows KDC - Delegation Option

2014-04-25 Thread Russ Allbery
Ben H bhen...@gmail.com writes: Based on your prior explanation I can't help but infer this means that although the new forwardable TGT session key may be different than my original TGT, it is still shared between all hosts that I delegate to, leading to a possible attack against all systems