Re: RFR 8215032: Support Kerberos cross-realm referrals (RFC 6806)

2019-06-10 Thread Martin Balao
On 6/10/19 8:59 AM, Michael Osipov wrote: > Do I have still have some time to test this in our multi-forest > environment? I have a large setup to "play" with. > This would be great. Thanks.

Re: RFR 8215032: Support Kerberos cross-realm referrals (RFC 6806)

2019-06-10 Thread Weijun Wang
> On Jun 10, 2019, at 7:59 PM, Michael Osipov <[email protected]> wrote: > > Am 2019-04-23 um 06:53 schrieb Weijun Wang: >> Hi Martin, >> >> Sorry for the delay. I went through the changes and they are all in the >> correct place. Next, I'll read the RFC carefully and make sure all behaviors

Re: RFR 8215032: Support Kerberos cross-realm referrals (RFC 6806)

2019-06-10 Thread Michael Osipov
Am 2019-04-23 um 06:53 schrieb Weijun Wang: Hi Martin, Sorry for the delay. I went through the changes and they are all in the correct place. Next, I'll read the RFC carefully and make sure all behaviors are correct. In the mean time, you can start preparing the CSR. BTW, what kinds of real w

Re: RFR 8215032: Support Kerberos cross-realm referrals (RFC 6806)

2019-06-09 Thread Weijun Wang
I made some tiny changes: s/(in advanced)/(in advance)/, change the property names to fixed width, and remove the full URL for JDK-8223172. One thing not sure. I am not a native English speaker, but "security or system properties" looks a little strange to me. I would use "property". You can cl

Re: RFR 8215032: Support Kerberos cross-realm referrals (RFC 6806)

2019-06-06 Thread Weijun Wang
> On Jun 6, 2019, at 11:38 PM, Martin Balao wrote: > > Hi Max, > > On 6/5/19 10:20 PM, Weijun Wang wrote: >> For the server referral part, I think we can clone some existing cross-realm >> authentication test and remove the [domain_realm] part in the client's >> krb5.conf and see if the aut

Re: RFR 8215032: Support Kerberos cross-realm referrals (RFC 6806)

2019-06-06 Thread Martin Balao
Hi Max, On 6/5/19 10:20 PM, Weijun Wang wrote: > For the server referral part, I think we can clone some existing cross-realm > authentication test and remove the [domain_realm] part in the client's > krb5.conf and see if the authentication still succeeds. I'm not sure why you would remove the

Re: RFR 8215032: Support Kerberos cross-realm referrals (RFC 6806)

2019-06-06 Thread Martin Balao
Hi Max, On 6/5/19 9:55 PM, Weijun Wang wrote: > >> If there are no further comments and jdk-submit tests succeed, I'll push >> tomorrow (2019-06-06) at around 11 am EST. > > None from me. > > Such a new feature would need a release note. I've created a skeleton at > https://bugs.openjdk.java.n

Re: RFR 8215032: Support Kerberos cross-realm referrals (RFC 6806)

2019-06-05 Thread Weijun Wang
Hi Martin, The new test in the changeset uses a simple homemade KDC and we might want to develop some internal tests that access real KDCs. For the server referral part, I think we can clone some existing cross-realm authentication test and remove the [domain_realm] part in the client's krb5.co

Re: RFR 8215032: Support Kerberos cross-realm referrals (RFC 6806)

2019-06-05 Thread Weijun Wang
> On Jun 6, 2019, at 3:22 AM, Martin Balao wrote: > > If there are no further comments and jdk-submit tests succeed, I'll push > tomorrow (2019-06-06) at around 11 am EST. None from me. Such a new feature would need a release note. I've created a skeleton at https://bugs.openjdk.java.net/br

Re: RFR 8215032: Support Kerberos cross-realm referrals (RFC 6806)

2019-06-05 Thread Martin Balao
Hi Max, Thanks for your feedback. On 6/4/19 12:28 AM, Weijun Wang wrote: > - java.security typos: > >492,497: ovewritten >496: infite > Fixed. > - CredentialsUtils.java: > >36: unused import > Fixed. > - KDCRep.java: > >no need to move the position > Fixed. > - Referra

Re: RFR 8215032: Support Kerberos cross-realm referrals (RFC 6806)

2019-06-03 Thread Weijun Wang
Tiny comments: - java.security typos: 492,497: ovewritten 496: infite - CredentialsUtils.java: 36: unused import - KDCRep.java: no need to move the position - ReferralsCache.java: Red Hat has different copyright lines. For example, in java.base. Maybe any one is OK. IANAL. S

Re: RFR 8215032: Support Kerberos cross-realm referrals (RFC 6806)

2019-05-28 Thread Martin Balao
Hi Max, Thanks for your feedback. Here it's Webrev.03: * http://cr.openjdk.java.net/~mbalao/webrevs/8215032/8215032.webrev.03/ Changes: * msgType is now private * Check in CredentialsUtil.java removed (always true) * "PrincipalName cSname = (PrincipalName) sname.clone();" not necessary

Re: RFR 8215032: Support Kerberos cross-realm referrals (RFC 6806)

2019-05-24 Thread Weijun Wang
> On May 25, 2019, at 4:43 AM, Martin Balao wrote: > > Hi Max, > > Thanks for your review. > > 1) > src/java.security.jgss/share/classes/sun/security/krb5/KrbAsReqBuilder.java: > > * When NT-ENTERPRISE names are used, a "@" char can be part of the name > and we should not interpret it as a

Re: RFR 8215032: Support Kerberos cross-realm referrals (RFC 6806)

2019-05-24 Thread Martin Balao
Hi Max, Thanks for your review. 1) src/java.security.jgss/share/classes/sun/security/krb5/KrbAsReqBuilder.java: * When NT-ENTERPRISE names are used, a "@" char can be part of the name and we should not interpret it as a realm separator. If we don't escape, we may be missing part of the name whe

Re: RFR 8215032: Support Kerberos cross-realm referrals (RFC 6806)

2019-05-21 Thread Weijun Wang
Sorry for the late reply. Comments below: 1. ReferralsState::handleError cname = new PrincipalName(cname.getNameString().replaceAll( PrincipalName.NAME_REALM_SEPARATOR + "", "" + PrincipalName.NAME_REALM_SEPARATOR), cname.getNameType(), referredRealm.toString()); Why is the escap

Re: RFR 8215032: Support Kerberos cross-realm referrals (RFC 6806)

2019-05-10 Thread Martin Balao
Hi, I'd like to propose Webrev.02: * http://cr.openjdk.java.net/~mbalao/webrevs/8215032/8215032.webrev.02/ Security properties were introduced mirroring System properties. See CSR [1]. Thanks, Martin.- -- [1] - https://bugs.openjdk.java.net/browse/JDK-8223172

Re: RFR 8215032: Support Kerberos cross-realm referrals (RFC 6806)

2019-04-30 Thread Martin Balao
Hi Max, Thanks for your feedback. Here it's Webrev.01: * http://cr.openjdk.java.net/~mbalao/webrevs/8215032/8215032.webrev.01/ Webrev.01 includes: * rep.encKDCRepPart.pAData may be null in KrbKdcRep.java (found by Max) * When requesting a TGS, the sname principal name is of type KRB_NT_SRV

Re: RFR 8215032: Support Kerberos cross-realm referrals (RFC 6806)

2019-04-22 Thread Weijun Wang
Hi Martin, Sorry for the delay. I went through the changes and they are all in the correct place. Next, I'll read the RFC carefully and make sure all behaviors are correct. In the mean time, you can start preparing the CSR. BTW, what kinds of real world KDC have you tested against? Thanks, Max

Re: RFR 8215032: Support Kerberos cross-realm referrals (RFC 6806)

2018-12-10 Thread Weijun Wang
Hi Martin, This is really a big contribution. I'll look at it once I have free time. Currently busy with last minute changes before JDK 12 RDP. Thanks, Max > On Dec 10, 2018, at 11:39 PM, Martin Balao wrote: > > Hi, > > I'd like to propose an implementation of Kerberos cross-realm referrals