-
Hi, I've successfully setup GSS-Proxy with NFS client and Constraint Delegation against Active Directory. I think I've understood how things are working but I still miss a couple of bits!
=> What are those for and how do they fit in the grand schema of things?
I guess that GSS-Proxy is somehow storing some bits in a memory cache.
=> Is there any way for GSS-Proxy to enforce forwardability in the impersonation scenario? (regardless of |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 2 replies
-
GSS-Proxy is used for privilege separation, however we do not want to litter the filesystem with expired ccaches and we want to leave the user in control of cacches, to that a kdestroy will allways work.
I think this is an internal MIT GSSAPI implementation detail. It needs to keep around some ticket/config entry while requesting info from the KDC, but those should not be stored in a regular ccache.
Not to my knowledge, but if you do not want to allow forwardable tickets for all users you can easily create a custom krb5.conf file only for gss-proxy and change the unit file to pass that configuration as the KRB5_CONFIG environment variable. |
Beta Was this translation helpful? Give feedback.
-
What ccache type do you use? |
Beta Was this translation helpful? Give feedback.
GSS-Proxy is used for privilege separation, however we do not want to litter the filesystem with expired ccaches and we want to leave the user in control of cacches, to that a kdestroy will allways work.
Therefore we encrypt the actual ticket in the system keytab (or a random key if a ketab is not available) and we place it back into the user's ccache as a special entry.
This way the user can manage the credential, but can't use it directly.