[
https://issues.apache.org/jira/browse/DIRKRB-621?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Colm O hEigeartaigh closed DIRKRB-621.
--------------------------------------
> 0x502 version keytab with multiple entries are not read properly
> ----------------------------------------------------------------
>
> Key: DIRKRB-621
> URL: https://issues.apache.org/jira/browse/DIRKRB-621
> Project: Directory Kerberos
> Issue Type: Bug
> Reporter: Attila Sasvari
> Assignee: Attila Sasvari
> Fix For: 1.0.0-GA
>
> Attachments: DIRKRB-621-00.patch, DIRKRB-621-01.patch,
> DIRKRB-621-02.patch, test_multiple_entries.keytab
>
>
> I have a version 0x502 keytab that contains multiple principles with multiple
> entries.
> {code}
> [root@65027d995418 /]# klist -ket test.keytab
> Keytab name: FILE:test.keytab
> KVNO Timestamp Principal
> ---- -----------------
> --------------------------------------------------------
> 3 04/11/17 14:16:34 test/[email protected]
> (aes256-cts-hmac-sha1-96)
> 3 04/11/17 14:16:34 test/[email protected]
> (aes128-cts-hmac-sha1-96)
> 3 04/11/17 14:16:34 test/[email protected] (des3-cbc-sha1)
> 3 04/11/17 14:16:34 test/[email protected] (arcfour-hmac)
> 3 04/11/17 14:16:34 test/[email protected] (camellia256-cts-cmac)
> 3 04/11/17 14:16:34 test/[email protected] (camellia128-cts-cmac)
> 3 04/11/17 14:16:34 test/[email protected] (des-hmac-sha1)
> 3 04/11/17 14:16:34 test/[email protected] (des-cbc-md5)
> 3 04/11/17 14:16:51 HTTP/[email protected]
> (aes256-cts-hmac-sha1-96)
> 3 04/11/17 14:16:52 HTTP/[email protected]
> (aes128-cts-hmac-sha1-96)
> 3 04/11/17 14:16:52 HTTP/[email protected] (des3-cbc-sha1)
> 3 04/11/17 14:16:52 HTTP/[email protected] (arcfour-hmac)
> 3 04/11/17 14:16:52 HTTP/[email protected] (camellia256-cts-cmac)
> 3 04/11/17 14:16:52 HTTP/[email protected] (camellia128-cts-cmac)
> 3 04/11/17 14:16:52 HTTP/[email protected] (des-hmac-sha1)
> 3 04/11/17 14:16:52 HTTP/[email protected] (des-cbc-md5)
> {code}
> {{org.apache.kerby.kerberos.kerb.keytab.KeyTab}} readEntry() is only able to
> read the first entry properly.
> On
> https://web.mit.edu/kerberos/krb5-1.12/doc/formats/keytab_file_format.html,
> we can read the following:
> {quote}
> Some implementations of Kerberos recognize a 32-bit key version at the end
> of an entry, if the record length is at least 4 bytes longer than the entry
> and the value of those 32 bits is not 0. If present, this key version
> supersedes the 8-bit key version.
> {quote}
> Looking at
> https://www.gnu.org/software/shishi/manual/html_node/The-Keytab-Binary-File-Format.html,
> it seems {{uint32_t vno; /* only present if >= 4 bytes left in entry */}} is
> not handled in the
> [load()|https://github.com/apache/directory-kerby/blob/8483322e58310ff33685a1f3893b71e7cf5f246f/kerby-kerb/kerb-util/src/main/java/org/apache/kerby/kerberos/kerb/keytab/KeytabEntry.java#L40]
> method of {{org.apache.kerby.kerberos.kerb.keytab.KeytabEntry}}.
> With the example keytab I generated, this is exactly the case. We need to
> read an additional in order to properly read in the entries for the
> principals.
> Additional info:
> Kerberos packages I installed on centos-release-7-3
> {noformat}
> krb5-devel.x86_64 1.14.1-27.el7_3
> krb5-libs.x86_64 1.14.1-27.el7_3
> krb5-server.x86_64 1.14.1-27.el7_3
> krb5-workstation.x86_64 1.14.1-27.el7_3
> {noformat}
--
This message was sent by Atlassian JIRA
(v6.3.15#6346)