I removed the plug from the snaps because LP:2123820 makes it
impractical, so for the end-user this solution is not yet available
until that bug is fixed.

** Changed in: chromium-browser (Ubuntu)
       Status: Fix Released => Deferred

** Changed in: firefox (Ubuntu)
       Status: In Progress => Deferred

** Description changed:

+ Chromium and Firefox bug tasks BLOCKED on LP:2123820.
+ 
  [SRU] 2.71: https://bugs.launchpad.net/ubuntu/+source/snapd/+bug/2118396
  
  [ Impact ]
  
  Programs that use Kerberos do not have access to Kerberos' tickets (by
  default, /tmp/krb5cc*) if snapped, resulting in denied access to
  documents that the user would otherwise be able to access if the program
  weren't snapped.
  
  [ Test Plan ]
  
  Requires a server that uses Kerberos authentication and a Ubuntu client,
  that for the following tests is presumed to have logged into the
  server's realm.
  
  Also requires configuring the browser in the client as per
  https://docs.active-directory-
  wp.com/Networking/Single_Sign_On/Configure_browsers_to_use_Kerberos.html,
  namely for Firefox, put the server name in network.negotiate-
  auth.trusted-uris.
  
  1. Reproduce on snapd deb < 2.71
  
  Install the Firefox snap.
  
  Expect:
   - websites that used to work with SPNEGO/GSSAPI/kerberos do not work (access 
denied).
   - 'snap connect firefox:kerberos-tickets' fails because Snapd < 2.71 does 
not yet have the corresponding slot.
  
  2. Prove fix on snapd 2.71
  
  First connect the new plug:
  
    snap connect firefox:kerberos-tickets
  
  Then access a document from said server, it should work.
  
  [ Regression potential ]
  
  Unauthorized snaps (i.e., without kerberos-tickets connection) have
  access to the tickets.
  
  Snaps fail to launch due to some bug in the implementation logic merged
  in https://github.com/canonical/snapd/pull/15519.
  
  ---original---
  
  Workaround
  ----------
  
  Add
  
    default_ccache_name = FILE:/run/user/%{euid}/krb5cc
  
  to the [libdefaults] section of /etc/krb5.conf so that the Kerberos
  credentials are stored in a file path a snapped application can read.
  
  Acknowledgement: For many that can't work for {different reasons}, as
  stated in multiple comments below. Nonetheless it is worth a mention.
  
  Original report
  ---------------
  
  I configure AuthServerWhitelist as documented:
  
  https://www.chromium.org/developers/design-documents/http-authentication
  
  and can see my whitelisted domains in chrome://policy/
  
  but websites that used to work with SPNEGO/GSSAPI/kerberos no longer
  work. I'm guessing the snap needs some sort of permission to use the
  kerberos ticket cache (or the plumbing to do so doesn't exist...).
  
  I can confirm that Chrome has the desired behavior.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1849346

Title:
  [SRU] kerberos GSSAPI no longer works after deb->snap transition

To manage notifications about this bug go to:
https://bugs.launchpad.net/firefox/+bug/1849346/+subscriptions


-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to