On 5/7/25 13:36, Michael B Allen wrote:
Where does the MITK initiator select the session key vs the subkey?
RC4 is a "not newer" enctype, so krb5_gss_wrap() calls make_seal_token_v1() with enc=ctx->enc.

ctx->enc is set up by kg_setup_keys() called at init_sec_context time. It is called first unconditionally in kg_new_connection(), with the initiator's subkey as set by krb5_mk_req_extended(). It may be called again by mutual_auth() with the acceptor's subkey, but only if:

* Mutual authentication is performed
* The AP-REP EncAPRepPart included an acceptor subkey
* The RFC 4121 message format is used (not for RC4), OR
  DCE-style authencation is in use, OR
  the acceptor subkey has a different enctype from the initiator subkey

Bonus question: Is there a trick to getting gdb to work with gss-client
-pass?

I haven't needed any trick. Using the test suite, I can run (from the top level of a build tree):

  cd appl/gss-sample
PYTHONPATH=../../../src/util python3 ../../../src/appl/gss-sample/t_gss_sample.py
  # Open testlog in a text editor and search for "arcfour"
  # from there, search for "-pass" and note the command number
  # for me right now that is 156, but there have been some recent
  # changes to the test script
PYTHONPATH=../../../src/util python3 ../../../src/appl/gss-sample/t_gss_sample.py -v --debug=156
  (gdb) break krb5_gss_wrap
  (gdb) run
________________________________________________
Kerberos mailing list           [email protected]
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to