Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 06 Oct 2024 04:33:43 +0000
From:      bugzilla-noreply@freebsd.org
To:        bugs@FreeBSD.org
Subject:   [Bug 280407] Authentication fails when using pam_krb5.so
Message-ID:  <bug-280407-227-nXJnBoRWAU@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-280407-227@https.bugs.freebsd.org/bugzilla/>

index | next in thread | previous in thread | raw e-mail

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=280407

Cy Schubert <cy@FreeBSD.org> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
         Resolution|---                         |Not A Bug
             Status|Open                        |Closed

--- Comment #8 from Cy Schubert <cy@FreeBSD.org> ---
(In reply to Anderson Soares Ferreira from comment #6)

This is normal now. pam_krb5 was vulnerable to CVE-2023-3326. To avoid a rogue
client spoofing a legitimate client one create a principal for the client and
place its keytab on the client. The server knows the client is legitimate When
the client presents its key from the keytab to the KDC. The kdc compares the
key presented by the client from its keytab with the principal in the KDC
database.

Works as designed.

-- 
You are receiving this mail because:
You are the assignee for the bug.

help

Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-280407-227-nXJnBoRWAU>