Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 3 Sep 2013 15:50:50 +0400
From:      Slawa Olhovchenkov <slw@zxy.spb.ru>
To:        Dag-Erling Sm??rgrav <des@des.no>
Cc:        freebsd-security@FreeBSD.org
Subject:   Re: OpenSSH, PAM and kerberos
Message-ID:  <20130903115050.GJ3796@zxy.spb.ru>
In-Reply-To: <86li3euovr.fsf@nine.des.no>
References:  <20130830131455.GW3796@zxy.spb.ru> <8661uj9lc6.fsf@nine.des.no> <20130902181754.GD3796@zxy.spb.ru> <867geywdfc.fsf@nine.des.no> <20130903083301.GF3796@zxy.spb.ru> <86y57euu8y.fsf@nine.des.no> <20130903093756.GG3796@zxy.spb.ru> <86ppsqutw7.fsf@nine.des.no> <20130903095316.GH3796@zxy.spb.ru> <86li3euovr.fsf@nine.des.no>

next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, Sep 03, 2013 at 01:27:04PM +0200, Dag-Erling Sm??rgrav wrote:

> Slawa Olhovchenkov <slw@zxy.spb.ru> writes:
> > Dag-Erling Sm??rgrav <des@des.no> writes:
> > > Slawa Olhovchenkov <slw@zxy.spb.ru> writes:
> > > > And how in this case can be resolved situation with PAM credentials
> > > > (Kerberos credentials in may case)?
> > > The application does not need them.
> > I need them. I need single sign-on, I need enter password only once,
> > at login time and use this credentials to login to other host and use
> > Kerberosed NFS w/o entering password.
> 
> The application does not need pam_krb5's temporary credential cache.  It
> is only used internally.  Single sign-on is implemented by storing your
> credentials in a *permanent* credential cache (either a file or KCM)
> which is independent of the PAM session and the application.  The
> location of the permanent credential cache is exported to the
> application through the KRB5CCNAME environment variable.

Yes, but content of credential cache got at time pam_authenticate().
And this content (size, structure and links to other objects)
invisible outside PAM. Application (and authenticate daemon) can't be
extract this for transfer and (in general case) can't be know about
necessary acts (write to file? what file? set enviroment?) -- all this
activity do internals by PAM modules -- one bu pam_krb5, other by
pam_opie and pam_unix. Also, authenticate daemon (in case authenticate
daemon call pam_setcred) can't be know what need to transfer (chaneged UID?
new enviroment? deleted enviroment?) 



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20130903115050.GJ3796>