Jeffrey Altman 34bf7ae162 kadmind: don't send bogus keys to ext_keytab et al
The Heimdal kadmind sends bogus keys when the client has 'get'
but not 'get-keys' permission.  For some kadmin commands this is
dangerous.  For example, ext_keytab could happily write bogus
keys to a keytab when real keys are expected, causing eventual
breakage.  Sending bogus keys is important for the kadmin get
command: so it can list the keysets that a principal has.

This patch implements a heuristic detection of kadmin get vs.
ext_keytab, add_enctype, del_enctype, and check commands.  If the
client principal lacks 'get-keys' permission, then the server
will fail requests that appear to be from those kadmin commands,
but will continue to serve bogus keys to kadmin get commands.

Thanks to Nico Williams for the idea behind this implementation.
2015-03-16 11:03:58 -05:00
2014-09-09 18:50:22 +02:00
2015-03-05 17:06:20 +00:00
2014-04-25 02:42:17 +02:00
2015-03-16 10:40:10 -05:00
2014-04-25 02:42:17 +02:00
2014-08-23 19:08:00 -07:00
2004-02-12 14:19:16 +00:00
2000-06-07 10:01:25 +00:00
2002-08-21 13:29:08 +00:00
2014-08-23 19:14:10 -07:00
2014-02-01 22:04:10 +00:00
2014-02-16 08:10:09 -08:00
2009-09-27 18:26:54 -07:00
2011-07-24 22:45:55 -07:00
2010-01-05 19:21:45 +01:00

Heimdal is a Kerberos 5 implementation.

For information how to install see <http://www.h5l.org/compile.html>.

There are briefer man pages for most of the commands.

Bug reports and bugs are appreciated, see more under Bug reports in
the manual on how we prefer them: <heimdal-bugs@h5l.org>.

For more information see the web-page at
<http://www.h5l.org/> or the mailing lists:

heimdal-announce@sics.se	low-volume announcement
heimdal-discuss@sics.se		high-volume discussion

send a mail to heimdal-announce-request@sics.se and
heimdal-discuss-request@sics.se respectively to subscribe.
Languages
C 92.1%
Roff 2.8%
Shell 2.3%
Makefile 0.7%
M4 0.5%
Other 1.4%