On Thu, Aug 23, 2012 at 08:18:18AM +0100, Arran Cudbard-Bell wrote:

>  So an interesting question would be - is anyone actually using
> EAP-Kerberos? If not, i'll disable caching by default and add a note
> to the configuration. AFAIK no supplicant has actually implemented
> any of the client side infrastructure to distribute tickets to other
> applications. It's annoying, SSO where you got your TGT from an
> 802.1X authentication would be really neat.

Disabling the cache by default would be great. Thanks!

EAP-Kerberos doesn't actually exist today as a documented spec -
I'm sure that's why there's no client side code. I agree that it 
would be very nice, not only for the SSO function, but also because
it would not be exposing the Kerberos password to the RADIUS
servers.

Many years ago, I tried to drum up interest in developing an
EAP-Kerberos spec in the IETF. Ultimately, it didn't go anywhere, 
but you can read some of the discussion in the following archived 
thread:

  http://www.ietf.org/mail-archive/web/secmech/current/msg00041.html

> > 2) Although freeradius is multi-threaded, the Kerberos authentication
> > module is single-threaded. I believe recent versions of both
> > MIT and Heimdal Kerberos libraries are threadsafe, but I don't 
> > think the freeradius code has been updated for this. So the only 
> > way to scale the performance of the RADIUS infrastructure is to 
> > deploy more servers (they don't have to by physical, you can install
> > multiple software instances on the same server if you have extra
> > CPUs or cores).
> > 
> > We currently have 8 freeradius servers running on 4 physical
> > servers (2 per box). And we balance the wireless controllers
> > across those.
> 
> As the university I used to work at, we were handling a similar load with two 
> Xserve G5s, but we were using LDAP and not Kerberos.
> 

The LDAP module is multithreaded, right? That would give it an
advantage. One other mistake we made was that our RADIUS server
hardware has many cores, but each core itself is quite slow -
this was before we found out that the freeradius krb5 module
was single threaded. If we'd known that earlier, we'd have instead
purchased machines with fewer faster cores.

> > One of our staff members is also looking at patching freeradius
> > to multithread the Kerberos bits, but unless the freeradius
> > folks accept those patches and maintain them, we likely won't
> > deploy that option in production.
> > 
> 
> v2.1.x has gone into an unofficial feature freeze for anything not related to 
> DHCP functionality. If you want this code to be included in function releases 
> please submit the patches against the master branch (3.0).
> 
> If the module uses long lived connection handles, it must use the connection 
> API (src/main/connection.c). rlm_rest, rlm_sql and rlm_ldap2 (still in 
> development) do this already, and all modules will be updated in time.
> 
> If the patches are well formatted, documented, and non-duplicative we'll 
> almost certainly accept them.
> 
> -Arran

Thanks! I'll pass this info along to our team!

--Shumon.

-- 
Shumon Huque
University of Pennsylvania.

**********
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.

Reply via email to