Edit report at https://bugs.php.net/bug.php?id=74636&edit=1

 ID:                 74636
 User updated by:    chanlists at googlemail dot com
 Reported by:        chanlists at googlemail dot com
 Summary:            [krb5] negotiate auth broken for vhosts because of
                     hostname canonicalization
 Status:             Assigned
 Type:               Bug
 Package:            PECL
 Operating System:   debian 8
 PHP Version:        5.6.30
 Assigned To:        mbechler
 Block user comment: N
 Private report:     N

 New Comment:

Great. Works for me just fine whether dns_canonicalize_hostname is set on the 
client or not (if I stick all relevant principals in the keytab). Thanks,

Christian


Previous Comments:
------------------------------------------------------------------------
[2017-05-25 14:10:30] mbechler at eenterphace dot org

Just commited another version in which you can pass GSS_C_NO_NAME instead of 
the SPN to achieve that. Also includes support for gss_acquire_cred_from 
(krb5_import_cred turned out to be unusable for SPNEGO).

------------------------------------------------------------------------
[2017-05-25 12:08:04] chanlists at googlemail dot com

OK, what I have tried now is the following patch relative to your latest 
version:

248,249d247
<       } else if(spn[0] == '@') {
<               object->servname = GSS_C_NO_NAME;

The effect of this is that if I set the service name to '@', it will use 
GSS_C_NO_NAME... and therefore accept all principals in the keytab.

------------------------------------------------------------------------
[2017-05-25 09:56:02] mbechler at eenterphace dot org

Yes, in that case it should be safe. Just saying that there are some 
implications to it.

Generally, it would be wise to switch to gss_krb5_import_cred anyhow (if 
available) as currently this is a bit of a hack (the keytab set with 
register_acceptor_identitity really is process state, if you use multiple 
instances or something else fiddles with it you are in trouble). I think that 
might just have that behavior (loading all keys from the given keytab) anyways.

------------------------------------------------------------------------
[2017-05-24 12:40:58] chanlists at googlemail dot com

Hm... But if I use a separate keytab file for the PHP script, I can control 
which principals I stick in there, and so it should not try whatever is in 
/etc/krb5.keytab, and only those in my dedicated keytab, say 
/etc/apache2/my_httpd_keytab_file.keytab? In that case adding an option should 
be safe...

------------------------------------------------------------------------
[2017-05-24 10:51:10] mbechler at eenterphace dot org

Passing GSS_C_NO_NAME or GSS_C_NO_CREDENTIAL to accept_context respecively has 
some (possible acceptable) downsides:
a) it invokes implementation dependant behavior (spec essentially says 
implementations can choose whichever keys they like) - but the common and more 
recent implementations (e.g. mit since 1.7 - which is pretty old) seem have the 
desired behavior (trying all keys).
b) this supposedly will also try the default keytab, which means that anyone 
with access to one of these other keys (if there are any) can forge tickets for 
your service. That might be an subtle security issue in some setups.

If I were using that personally, I would probably rather go for either 
redirecting to a canonical host or constructing and passing the proper SPN. But 
I think I would be okay with adding an option to enable that behavior.

------------------------------------------------------------------------


The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at

    https://bugs.php.net/bug.php?id=74636


--
Edit this bug report at https://bugs.php.net/bug.php?id=74636&edit=1

-- 
PECL development discussion Mailing List (http://pecl.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to