Groups | Search | Server Info | Login | Register


Groups > comp.protocols.kerberos > #5337

Re: honoring the TRUSTED_FOR_DELEGATION KDC MS-SFU Kerberos Protocol Extensions flag?

Path csiph.com!tncsrv06.tnetconsulting.net!.POSTED.mailman.mit.edu!not-for-mail
From James Ralston <ralston@pobox.com>
Newsgroups comp.protocols.kerberos
Subject Re: honoring the TRUSTED_FOR_DELEGATION KDC MS-SFU Kerberos Protocol Extensions flag?
Date Thu, 27 Jun 2024 02:19:58 -0400
Organization TNet Consulting
Lines 81
Message-ID <mailman.108.1719469219.2322.kerberos@mit.edu> (permalink)
References <CAEkxbZuz1h7Ef4N5nz3teb8vcTxTE6iBUZC+TYssUcayKHhXQQ@mail.gmail.com> <202404152356.43FNu4Wj009470@hedwig.cmf.nrl.navy.mil> <Zh3JEbB0IfDztgSQ@tamriel.snowman.net> <CAEkxbZvn=3G3MVossM0aRC3pFd+JCX13ugUo6BwyKqaKtv--xg@mail.gmail.com> <202404170130.43H1UpOg023445@hedwig.cmf.nrl.navy.mil> <CAEkxbZupQObPrSC7PLvVV9+de8Pjj=d=dYRZWFvY3wMyUQPxMA@mail.gmail.com> <202404301649.43UGnfNE028201@hedwig.cmf.nrl.navy.mil> <CAEkxbZuo2GEZoAhXY-vbcYsMUn0jeRWRyaPB_2YCVNc2oLq_GA@mail.gmail.com>
Mime-Version 1.0
Content-Type text/plain; charset="UTF-8"
Content-Transfer-Encoding 8bit
Injection-Info tncsrv06.tnetconsulting.net; posting-host="mailman.mit.edu:18.7.21.50"; logging-data="13208"; mail-complaints-to="newsmaster@tnetconsulting.net"
To kerberos@mit.edu
DKIM-Filter OpenDKIM Filter v2.11.0 unknown-host (unknown-jobid)
Authentication-Results mailman.mit.edu; dkim=pass (1024-bit key, unprotected) header.d=mitprod.onmicrosoft.com header.i=@mitprod.onmicrosoft.com header.a=rsa-sha256 header.s=selector2-mitprod-onmicrosoft-com header.b=pc3XtE2w; dkim=pass (1024-bit key, unprotected) header.d=pobox.com header.i=@pobox.com header.a=rsa-sha256 header.s=sasl header.b=gKnZZ32L
ARC-Seal i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=OTSOi6u5G5TCpzYmtl65cS+8Qd6QPu0m/ruVVkMJOEldMow3RjF1MX3fdJqwbRpCv7o3cEYOetsVf4/PhYgc86iyyIjuaMg/JpHlSWJu1f/9d56z0rjP+djDe1OBKqv+tt3QVGh6rsiEdIqihdykQMdRNujp2O6F8gy/yOm6sEgn+69tnO5Glmo3Vigg0NwIp5vnJ7Kou41dHix8q10YYphPdFk8pQVs/UvtzOB3HyuAghbsaNLl1ISVHfLdlZEPpwk+xhROC7nZ/ZObiC85rYtSsn7WcyWQ9P8srxAhkIHC2i9AszThwihmI7/pNjTEYQWrmgnQ3clFvNW4TDLrzw==
ARC-Message-Signature i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=AD3z+LnraNHrUJgk2c9QsOCSasec7SF5/ERUQK/pfVg=; b=EIwDKsIdj1GdNUcgKunWLpZn5QMfiXXQ5NJGBeEcdPPJqsN53VyRZWk0kjvgy/UHM8kgB7Gcl7QAW0RJagVIDL7HP9+QUNXV2onXNNllOe5jUe1/be17GbJvUNFVSxpwbqSqWTIUdGsGvgO9av6CzRB3uKgiR92ZO28sBwgTbC8pVTC4/BlG/0lROqtHQ93nYIYRIVc8rfPgRjp8bqq2e8hlUTNZH7G2s/8Fk98A+DJTfTJ6dzlT/DgNj+cyVFG0rflV6l/RqQijN4g7TQuN+6ueQF4rvZRVIQNMmiDOvyrIuGF4/42077JzYUYoPXZYP1SHsY/gH3uDHspgbR8Lsw==
ARC-Authentication-Results i=1; mx.microsoft.com 1; spf=pass (sender ip is 64.147.108.70) smtp.rcpttodomain=mit.edu smtp.mailfrom=pobox.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=pobox.com; dkim=pass (signature was verified) header.d=pobox.com; arc=none (0)
DKIM-Signature v=1; a=rsa-sha256; c=relaxed/relaxed; d=mitprod.onmicrosoft.com; s=selector2-mitprod-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=AD3z+LnraNHrUJgk2c9QsOCSasec7SF5/ERUQK/pfVg=; b=pc3XtE2wFNM3qKXAhXjV1etHZ7pOzpnspKRAWijNTI8t7kRaNvNf6XSPHzmXtmcqifggzU+JlBlN948US3RyWvc5dlhLP7eaFOWwA2Ng2RTGA+DPkVrsABRV2MnJ9tBSvbXOsKZxPupgLgQm5R9C1Cp9lYIu6ZIU0/9S7ulMWU4=
Authentication-Results spf=pass (sender IP is 64.147.108.70) smtp.mailfrom=pobox.com; dkim=pass (signature was verified) header.d=pobox.com;dmarc=pass action=none header.from=pobox.com;
Received-SPF Pass (protection.outlook.com: domain of pobox.com designates 64.147.108.70 as permitted sender) receiver=protection.outlook.com; client-ip=64.147.108.70; helo=pb-smtp1.pobox.com; pr=C
DKIM-Signature v=1; a=rsa-sha256; c=relaxed; d=pobox.com; h= mime-version:references:in-reply-to:from:date:message-id:subject :to:content-type:content-transfer-encoding; s=sasl; bh=dURIYMpmk /H+L1Z5xqoBfQ4BsxlAVcELlkx5Q7BglEg=; b=gKnZZ32LZEh53OQlzGmS2edWS AHfxIK9eVAPsgXh9ubwl7I2I2O0lT8QXrtXJMCqdxHsrxE5MSxQ5ejgG/XpX+uqX 4fvuUkeDzqye5UQ+YtibWwnnDylaHOI1mVCX/4/rTC7xpEoMIq4m7y9G1H3Kr67/ /DEH4aVnHmXTcmR0Xk=
X-Gm-Message-State AOJu0YyLn8TMyuYFy8v4FiwZblwfmF4MljI36m62NziHtZAuShu+l0RW z10Vi/dxuoKfFjwxwgcJilgtOcK2/EouQLnM230zu8LyZmmwJNr32rkVfJ/pqD7ko8zP21IQMIo Pdn/7ZA+IVpjb+hZWjAUkf7XkZkw=
X-Google-Smtp-Source AGHT+IEnJcdB4suc4lksZF1vhmA/dpyx3ZegjfVHZqzs5xnTl/wsKKzNcPFJokweSmc1aW40khvT0uK9Potn509cOCI=
X-Received by 2002:a17:907:c085:b0:a72:7f22:5f9e with SMTP id a640c23a62f3a-a727f84870bmr351289466b.57.1719469210883; Wed, 26 Jun 2024 23:20:10 -0700 (PDT)
In-Reply-To <202404301649.43UGnfNE028201@hedwig.cmf.nrl.navy.mil>
X-Gmail-Original-Message-ID <CAEkxbZuo2GEZoAhXY-vbcYsMUn0jeRWRyaPB_2YCVNc2oLq_GA@mail.gmail.com>
X-Pobox-Relay-ID 4F570E7E-344D-11EF-A67D-5B6DE52EC81B-52429198!pb-smtp1.pobox.com
X-EOPAttributedMessage 0
X-EOPTenantAttributedMessage 64afd9ba-0ecf-4acf-bc36-935f6235ba8b:0
X-MS-PublicTrafficType Email
X-MS-TrafficTypeDiagnostic BN2PEPF00004FBA:EE_|MW4PR01MB6436:EE_
X-MS-Office365-Filtering-Correlation-Id 019f3a44-b30a-4fc9-d797-08dc9671345a
X-LD-Processed 64afd9ba-0ecf-4acf-bc36-935f6235ba8b,ExtAddr
X-MS-Exchange-AtpMessageProperties SA
X-MS-Exchange-SenderADCheck 0
X-MS-Exchange-AntiSpam-Relay 0
X-Microsoft-Antispam BCL:0; ARA:13230040|61400799027|376014|7093399012|43022699015|48200799018;
X-Microsoft-Antispam-Message-Info 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
X-Forefront-Antispam-Report CIP:64.147.108.70; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:pb-smtp1.pobox.com; PTR:pb-smtp1.pobox.com; CAT:NONE; SFS:(13230040)(61400799027)(376014)(7093399012)(43022699015)(48200799018); DIR:OUT; SFP:1102;
X-ExternalRecipientOutboundConnectors 64afd9ba-0ecf-4acf-bc36-935f6235ba8b
X-Auto-Response-Suppress DR, OOF, AutoReply
X-OriginatorOrg mitprod.onmicrosoft.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime 27 Jun 2024 06:20:13.2357 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id 019f3a44-b30a-4fc9-d797-08dc9671345a
X-MS-Exchange-CrossTenant-Id 64afd9ba-0ecf-4acf-bc36-935f6235ba8b
X-MS-Exchange-CrossTenant-AuthSource BN2PEPF00004FBA.namprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader Internet
X-MS-Exchange-Transport-CrossTenantHeadersStamped MW4PR01MB6436
X-MIME-Autoconverted from quoted-printable to 8bit by mailman.mit.edu id 45R6KHgv906860
X-BeenThere kerberos@mit.edu
X-Mailman-Version 2.1.34
Precedence list
List-Id The Kerberos Authentication System Mailing List <kerberos.mit.edu>
List-Unsubscribe <https://mailman.mit.edu/mailman/options/kerberos>, <mailto:kerberos-request@mit.edu?subject=unsubscribe>
List-Archive <http://mailman.mit.edu/pipermail/kerberos/>
List-Post <mailto:kerberos@mit.edu>
List-Help <mailto:kerberos-request@mit.edu?subject=help>
List-Subscribe <https://mailman.mit.edu/mailman/listinfo/kerberos>, <mailto:kerberos-request@mit.edu?subject=subscribe>
X-Mailman-Original-Message-ID <CAEkxbZuo2GEZoAhXY-vbcYsMUn0jeRWRyaPB_2YCVNc2oLq_GA@mail.gmail.com>
X-Mailman-Original-References <CAEkxbZuz1h7Ef4N5nz3teb8vcTxTE6iBUZC+TYssUcayKHhXQQ@mail.gmail.com> <202404152356.43FNu4Wj009470@hedwig.cmf.nrl.navy.mil> <Zh3JEbB0IfDztgSQ@tamriel.snowman.net> <CAEkxbZvn=3G3MVossM0aRC3pFd+JCX13ugUo6BwyKqaKtv--xg@mail.gmail.com> <202404170130.43H1UpOg023445@hedwig.cmf.nrl.navy.mil> <CAEkxbZupQObPrSC7PLvVV9+de8Pjj=d=dYRZWFvY3wMyUQPxMA@mail.gmail.com> <202404301649.43UGnfNE028201@hedwig.cmf.nrl.navy.mil>
Xref csiph.com comp.protocols.kerberos:5337

Show key headers only | View raw


To wrap up this thread: after discussing this issue with our Windows
admins over the past few months, we have concluded that the correct
course of action here is to set the TRUSTED_FOR_DELEGATION flag in the
userAccountControl attribute for all Linux host machine accounts that
we control.  This will ensure that AD sets the OK-AS-DELEGATE flag in
the TGS-REP, which ensures that ssh credential forwarding will work
correctly regardless of whether the specific Kerberos client
implementation honors the OK-AS-DELEGATE flag by default.

Our considerations were:

* Kerberos clients are free to honor or ignore the OK-AS-DELEGATE
  flag, and it is not necessarily obvious which clients do or do not
  honor it by default.

* Thus, if we do not set the OK-AS-DELEGATE flag, then we would need
  to continually identify all Kerberos client implementations in play
  in our enterprise, determine which ones honor the OK-AS-DELEGATE
  flag by default, determine a way to override that default to ignore
  the OK-AS-DELEGATE flag, and find a way to automate that override.
  This would require nontrivial effort.

* Setting the TRUSTED_FOR_DELEGATION flag in the userAccountControl
  attribute is intended to indicate that the host is administered by
  reputable/trusted parties and that it can be trusted for delegation.
  This is the case for us, so we are using the TRUSTED_FOR_DELEGATION
  flag exactly as it was intended.

Unfortunately, our Windows admins have yet to be able to find a way to
delegate the ability to set the TRUSTED_FOR_DELEGATION flag in the
userAccountControl attribute on a per-OU basis.  They can delegate
just about any other ability to us (the Linux admins) for hosts in the
OUs that contain Linux hosts, but no matter what they try, we get an
*Insufficient privileges* error whenever we attempt to set the
TRUSTED_FOR_DELEGATION flag on a Linux host.  (They are beginning to
suspect that Active Directory might have some special hardcoded “only
domain admins can set the TRUSTED_FOR_DELEGATION flag” rule that
cannot be overridden or delegated.)

Ultimately, they might have to resort to (e.g.) automating a
Powershell script to enumerate the host machine accounts in our Linux
OUs, and automatically setting the TRUSTED_FOR_DELEGATION flag for any
hosts that are missing it.

If we can figure out a way to delegate the ability to set the
TRUSTED_FOR_DELEGATION flag, I’ll post it to this thread, for anyone
in the future who might find themselves in the same position.

My thanks to everyone who provided feedback in this thread.

On Tue, Apr 30, 2024 at 12:49 PM Ken Hornstein <kenh@cmf.nrl.navy.mil> wrote:

> > I think the core issue here is that RFC4120§2.8 was unclear in
> > defining the OK-AS-DELEGATE flag.
>
> I have to say that IMHO, the explanation in RFC 4120 is clear to me
> and the current implementations within the MacOS X Kerberos code fall
> squarely within the scope of the RFCs explanation.

Yes, it was clearly written; yes, clients are not violating the RFC.

And yet: the implementation of this feature still resulted in 5+ years
of silent breakage, the avoidance of which required delegating users’
actual *passwords* to the remote systems.  Had the systems in question
had in fact been untrustworthy, this would have resulted in a far
greater security risk than simply delegating the credentials in the
first place.

The OK-AS-DELEGATE flag might have satisfied the specific itch that
Microsoft wanted to scratch, but it was poorly conceived and poorly
implemented.  Especially for people in heterogeneous environments,
this flag is a treacherously subtle landmine.

> You are, of course, free to express your opinions about the
> implementation of these protocols extensions, but ... well, other
> than the satisfaction of primal screaming into the void, I'm not
> sure how helpful that will be.

Poorly-conceived and implemented protocol extensions should be called
out, if for no other reason than to avoid repeating their mistakes.

Back to comp.protocols.kerberos | Previous | Next | Find similar


Thread

Re: honoring the TRUSTED_FOR_DELEGATION KDC MS-SFU Kerberos Protocol Extensions flag? James Ralston <ralston@pobox.com> - 2024-06-27 02:19 -0400

csiph-web