Not sure if it is helpful for debugging (other than you get caller stacktraces 
and a logfile) but for audit purpose a single
consolidated event which allows to see which real, which kdc, which ciphers and 
Idendity might be a thing useable
even in production. Especially if also SSPI/native cache is involved.

It’s a similar usecase to the TLS handshake events which you can use to check 
if a cipher you want to remove is still used.

Horváth Péter Gergely wrote on 15. Mar 2024 23:25 (GMT +01:00):

> Hi Sean,
> 
> This is a tough question. I guess maybe the same granularity as the log
> messages: that is,
> emitting a JFR event for every step where now a log message is logged,
> with similar parameters
> would probably make sense?
> 
> At the same time, would anyone use JFR events to debug a Kerberos issue? I
> am unsure about that.
> What do you think?
> 
> Best,
> Peter
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> Seán Coffey <sean.cof...@oracle.com> ezt írta (időpont: 2024. márc.
> 13.,
> Sze, 10:53):
> 
>>
>> On 13/03/2024 01:40, Wei-Jun Wang wrote:
>>
>> Thinking about this raises the question: wouldn't it be possible to have
>> these components emit Flight Recorder events as well?
>> I understand this is a dubious topic, as some arguments contain secrets,
>> but it would be interesting to know.
>> Maybe restricting FR events when security debug logging is enabled
>> anyways would be an option?
>>
>> Seán is our expert on JFR events. He has already created some
>> security-related events, like provider loading and security properties
>> access. You can tell him what else you are interested in.
>>
>> Using JFR events is certainly worthy of discussion. What would those JFR
>> events looks like ? Would you propose one for each log action currently
>> in
>> the krb5 code ? It becomes unmaintainable IMO.
>>
>> The suggestion has also been made for the TLS logging code in the past.
>> It's not trivial to convert every log entry to a JFR event. A typical
>> client/server handshake in TLS can generate 1000's of lines of log output
>> with -Djavax.net.debug=all enabled. It doesn't translate easily to JFR
>> events. Reading text is probably easier also.
>>
>> On a related note, I think the current TLS logging is too verbose at the
>> moment. Over 3,500 lines of output are generated before a ClientHello
>> gets
>> created in a typical TLS debug capture. It's too much. Most of it is
>> iterating over certs found in the truststore (cacerts by default). Need
>> to
>> log a bug on that.
>>
>> regards,
>> Sean.
>>
> 


Gruß
Bernd
— 
https://bernd.eckenfels.net

Reply via email to