* Andrew Deason ([EMAIL PROTECTED]) wrote:
> Suppose I want to use krb5_ccname and SASL, so I can have a host
> authenticate with its host principal from a keytab. However, I don't want
> normal users to be able to read the host principal keytab; I just want
> libnss-ldap to use their own kerberos credentials. If I specify krb5_ccname
> in /etc/libnss-ldap.conf, and the file is not readable to the user, it just
> fails. This patch makes libnss-ldap attempt to try authenticating again with
> the unchanged ccache if the modified ccache fails for whatever reason. It
> appears to work on a test machine. (I.e. it falls back to user credentials if
> the krb5_ccname credentials fail.)

In general I like this idea but I'm not sure about its implementation.
It strikes me as rather excessive to attempt multiple binds in this way
and to cause that extra load on the server.  Also, it may hide other
real problems beyond permissions on the ccache.  How about just
attempting to open the modified ccache?  If you can't open then it's not
very likely to work and you can switch to the unmodified one.

        Thanks!

                Stephen

Attachment: signature.asc
Description: Digital signature

Reply via email to