After

  default_ccache_name = FILE:/home/%{username}/krb5cc

this works. So let me first of all put this in the bug report
description.

I do read many comments that say that changing default_ccache_name is
not an option. But as they do not state what that is for them, so I
don't have much of an idea of what are the most common scenarios to
target first, although I'd guess it's really /tmp.

If default_ccache_name can be anywhere at all in the file-system, even
in a key-ring... I find it hard to see a fully encompassing solution for
a sandboxed (snapped) application.

** Description changed:

+ Workaround
+ ----------
+ 
+ Execute
+ 
+   echo 'default_ccache_name = FILE:/home/%{username}/krb5cc' >>
+ /etc/krb5.conf.
+ 
+ so that the Kerberos credentials are stored in a file path a snapped
+ application can read.
+ 
+ Acknowledgement: For many that can't work for {different reasons}, as
+ stated in multiple comments below. Nonetheless it is worth a mention.
+ 
+ Original report
+ ---------------
+ 
  I configure AuthServerWhitelist as documented:
  
  https://www.chromium.org/developers/design-documents/http-authentication
  
  and can see my whitelisted domains in chrome://policy/
  
  but websites that used to work with SPNEGO/GSSAPI/kerberos no longer
  work. I'm guessing the snap needs some sort of permission to use the
  kerberos ticket cache (or the plumbing to do so doesn't exist...).
  
  I can confirm that Chrome has the desired behavior.

** Description changed:

  Workaround
  ----------
  
  Execute
  
-   echo 'default_ccache_name = FILE:/home/%{username}/krb5cc' >>
- /etc/krb5.conf.
+   echo 'default_ccache_name = FILE:/home/%{username}/krb5cc' >>
+ /etc/krb5.conf
  
  so that the Kerberos credentials are stored in a file path a snapped
  application can read.
  
  Acknowledgement: For many that can't work for {different reasons}, as
  stated in multiple comments below. Nonetheless it is worth a mention.
  
  Original report
  ---------------
  
  I configure AuthServerWhitelist as documented:
  
  https://www.chromium.org/developers/design-documents/http-authentication
  
  and can see my whitelisted domains in chrome://policy/
  
  but websites that used to work with SPNEGO/GSSAPI/kerberos no longer
  work. I'm guessing the snap needs some sort of permission to use the
  kerberos ticket cache (or the plumbing to do so doesn't exist...).
  
  I can confirm that Chrome has the desired behavior.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1849346

Title:
  [snap] kerberos GSSAPI no longer works after deb->snap transition

To manage notifications about this bug go to:
https://bugs.launchpad.net/firefox/+bug/1849346/+subscriptions


-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to