• heimdal http proxy

    From Charles Hedrick@21:1/5 to All on Sat Sep 11 15:22:26 2021
    I’d like to be able to use Kerberos SPNEGO at home. Unfortunately the Mac uses Heimdal.

    We don’t currently explore our Kerberos servers to the Internet, but we do have an https proxy for MIT kerberos. Heimal apparently has its own HTTP proxy. Does anyone know of software to implement the proxy?

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Rick van Rein@21:1/5 to Charles Hedrick on Sat Sep 11 18:22:48 2021
    Copy: kerberos@mit.edu (kerberos@mit.edu)

    Hello Charles,

    I???d like to be able to use Kerberos SPNEGO at home. Unfortunately the Mac uses Heimdal.

    SPNEGO has really a low security level. I am surprised this is considered acceptable for a https proxy.

    We are working on two better solutions, with software that classifies only little over "proof of concept'.

    - TLS-KDH to integrate Kerberos authentication with ECDH encryption;
    this combination is in fact Quantum Proof

    https://datatracker.ietf.org/doc/html/draft-vanrein-tls-kdh

    - HTTP-SASL integrates SASL as a HTTP authentication mechanism, and this
    is meant to allow Kerberos as well. In contrast with SPNEGO, it would
    be possible to require Channel Binding (at least to the webserver _name_).

    https://datatracker.ietf.org/doc/html/draft-vanrein-httpauth-sasl


    Take note: These have not even been proposed on this list, simply due to
    lack of time to actively discuss it (been mostly occupied with this and
    related implementations). So at best this could be a future opportunity. Still, your usecase may help to propell the work forward, so please share
    if this would be helpful for your situation. You may want to pass this
    by your sysadmin too.


    Cheers,
    -Rick

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roland C. Dowdeswell@21:1/5 to Charles Hedrick on Sat Sep 11 21:13:18 2021
    Copy: kerberos@mit.edu (kerberos@mit.edu)

    On Sat, Sep 11, 2021 at 03:22:26PM +0000, Charles Hedrick wrote:


    I’d like to be able to use Kerberos SPNEGO at home. Unfortunately
    the Mac uses Heimdal.

    We don’t currently explore our Kerberos servers to the Internet,
    but we do have an https proxy for MIT kerberos. Heimal apparently has
    its own HTTP proxy. Does anyone know of software to implement the proxy?

    Heimdal does support SPNEGO. Can you be more specific about what you
    are trying that is not working?

    Thanks,

    --
    Roland C. Dowdeswell https://Imrryr.ORG/

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Charles Hedrick@21:1/5 to Roland C. Dowdeswell on Sat Sep 11 22:03:09 2021
    Copy: kerberos@mit.edu (kerberos@mit.edu)

    At home I’m outside our firewall. We have an https proxy that works fine for MIT implementations, but not heimdal. Heimdal has an http proxy configuration available in krb5.conf, but that’s useless without an actual proxy server. I’m looking for an
    implementation of the proxy. I also don’t see any example of the format needed to define the proxy in krb5.conf.

    An alternative is to open port 88 from the outside. I’m not sure how risky that actually is. The Kdc is a pretty mature piece of software.


    On Sep 11, 2021, at 4:13 PM, Roland C. Dowdeswell <elric@imrryr.org> wrote:

    On Sat, Sep 11, 2021 at 03:22:26PM +0000, Charles Hedrick wrote:


    I’d like to be able to use Kerberos SPNEGO at home. Unfortunately
    the Mac uses Heimdal.

    We don’t currently explore our Kerberos servers to the Internet,
    but we do have an https proxy for MIT kerberos. Heimal apparently has
    its own HTTP proxy. Does anyone know of software to implement the proxy?

    Heimdal does support SPNEGO. Can you be more specific about what you
    are trying that is not working?

    Thanks,

    --
    Roland C. Dowdeswell https://Imrryr.ORG/

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Charles Hedrick@21:1/5 to Rick van Rein on Sat Sep 11 22:33:53 2021
    Copy: kerberos@mit.edu (kerberos@mit.edu)

    Another use case is getting tickets for Mac users. We have a few users that ssh into enough different hosts that they want to use kerberized ssh. Unless we open port 88 to the outside, they have to install Mac ports and use the MIT kinit. While it seems
    simple to me, it’s not for real users. If they could point Heimdal to a proxy I think it would be easier to support. It won’t work for two factor, since Apples Heimdal kinit doesn’t support that, but most of users don’t use two factors, just
    privileged users.

    The easier solution would be for Apple to move to MIT, but I have no way to make that happen.

    On Sep 11, 2021, at 2:22 PM, Rick van Rein <rick@openfortress.nl> wrote:

    Hello Charles,

    I???d like to be able to use Kerberos SPNEGO at home. Unfortunately the Mac uses Heimdal.

    SPNEGO has really a low security level. I am surprised this is considered acceptable for a https proxy.

    We are working on two better solutions, with software that classifies only little over "proof of concept'.

    - TLS-KDH to integrate Kerberos authentication with ECDH encryption;
    this combination is in fact Quantum Proof

    https://datatracker.ietf.org/doc/html/draft-vanrein-tls-kdh

    - HTTP-SASL integrates SASL as a HTTP authentication mechanism, and this
    is meant to allow Kerberos as well. In contrast with SPNEGO, it would
    be possible to require Channel Binding (at least to the webserver _name_).

    https://datatracker.ietf.org/doc/html/draft-vanrein-httpauth-sasl


    Take note: These have not even been proposed on this list, simply due to
    lack of time to actively discuss it (been mostly occupied with this and related implementations). So at best this could be a future opportunity. Still, your usecase may help to propell the work forward, so please share
    if this would be helpful for your situation. You may want to pass this
    by your sysadmin too.


    Cheers,
    -Rick

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Ken Hornstein@21:1/5 to Charles Hedrick on Sat Sep 11 19:06:57 2021
    Copy: kerberos@mit.edu (kerberos@mit.edu)

    Another use case is getting tickets for Mac users. We have a few users
    that ssh into enough different hosts that they want to use kerberized
    ssh. Unless we open port 88 to the outside, they have to install Mac
    ports and use the MIT kinit.

    So they can't open port 88 to the outside, but port 88-via-80 is fine?

    --Ken

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Charles Hedrick@21:1/5 to Rick van Rein on Sat Sep 11 22:16:36 2021
    Copy: kerberos@mit.edu (kerberos@mit.edu)

    My use case is a few web applications. Linux user group management, editing our wiki, and responding to help desk tickets. Generic web apps that I would like to use at home. We support CAS, but our university CAS server has disabled SSO. Since I already
    have a Kerberos ticket to use ssh, it would be nice to be able to get into the web apps without having to do CAS and Duo each time. (My Kerberos tickets also require two factor authentication to get them.)

    We use Kerberos and GSSAPI for other things, but not that I’d need at home.

    On Sep 11, 2021, at 2:22 PM, Rick van Rein <rick@openfortress.nl> wrote:

    Hello Charles,

    I???d like to be able to use Kerberos SPNEGO at home. Unfortunately the Mac uses Heimdal.

    SPNEGO has really a low security level. I am surprised this is considered acceptable for a https proxy.

    We are working on two better solutions, with software that classifies only little over "proof of concept'.

    - TLS-KDH to integrate Kerberos authentication with ECDH encryption;
    this combination is in fact Quantum Proof

    https://datatracker.ietf.org/doc/html/draft-vanrein-tls-kdh

    - HTTP-SASL integrates SASL as a HTTP authentication mechanism, and this
    is meant to allow Kerberos as well. In contrast with SPNEGO, it would
    be possible to require Channel Binding (at least to the webserver _name_).

    https://datatracker.ietf.org/doc/html/draft-vanrein-httpauth-sasl


    Take note: These have not even been proposed on this list, simply due to
    lack of time to actively discuss it (been mostly occupied with this and related implementations). So at best this could be a future opportunity. Still, your usecase may help to propell the work forward, so please share
    if this would be helpful for your situation. You may want to pass this
    by your sysadmin too.


    Cheers,
    -Rick

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Charles Hedrick@21:1/5 to Ken Hornstein on Sun Sep 12 01:35:18 2021
    Copy: kerberos@mit.edu (kerberos@mit.edu)

    The hope is that the proxy will read requests and validate them. Thus passing through the proxy would be less dangerous that exposing port 88 directly. If that’s not true, we should consider the risks of making port 88 available, or give up.

    On Sep 11, 2021, at 7:07 PM, Ken Hornstein <kenh@cmf.nrl.navy.mil> wrote:

    

    Another use case is getting tickets for Mac users. We have a few users
    that ssh into enough different hosts that they want to use kerberized
    ssh. Unless we open port 88 to the outside, they have to install Mac
    ports and use the MIT kinit.

    So they can't open port 88 to the outside, but port 88-via-80 is fine?

    --Ken

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Grant Taylor@21:1/5 to Charles Hedrick on Sat Sep 11 20:46:41 2021
    On 9/11/21 7:35 PM, Charles Hedrick wrote:
    The hope is that the proxy will read requests and validate them. Thus passing through the proxy would be less dangerous that exposing port
    88 directly. If that’s not true, we should consider the risks of
    making port 88 available, or give up.

    I would be quite surprised if you can find an HTTP(S) proxy that will scrutinize CONNECT traffic going to Kerberos related services.

    The thing that the proxy probably can do is authorization checking of
    who is allowed to do the CONNECT to Kerberos. E.g. authenticate to the
    proxy before issuing the CONNECT. Somewhat analogous to a VPN.



    --
    Grant. . . .
    unix || die


    MIAGCSqGSIb3DQEHAqCAMIACAQExDzANBglghkgBZQMEAgEFADCABgkqhkiG9w0BBwEAAKCC CzkwggUhMIIECaADAgECAhA/wgXwQl9mDHSg5enGHBeSMA0GCSqGSIb3DQEBCwUAMIGWMQsw CQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxm b3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxPjA8BgNVBAMTNVNlY3RpZ28gUlNBIENs aWVudCBBdXRoZW50aWNhdGlvbiBhbmQgU2VjdXJlIEVtYWlsIENBMB4XDTIwMTExNjAwMDAw MFoXDTIxMTExNjIzNTk1OVowKzEpMCcGCSqGSIb3DQEJARYaZ3RheWxvckB0bmV0Y29uc3Vs dGluZy5uZXQwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDM6cGNMlSUFPM3zVw+ VgSslz2QRtMj+FerQ0DpmgbhUzqm5hMRe0hMA2OBf41HDAeOV0RKcLx2+HozHlyQST2xagOX xiv91aEXezh8bEBfnOI564Ej/JfusomfoM7ByVXcLp3K3fOssHos6IXiAD6WT+jcRs7Cg+Gl bYyoDLDLXw4i/N+YRcp3JrwT+4g/i//wAea1qTEd+ZnfcqtvCHaiJrr16xEpzuraLcmH5qtN /c+5kkRN3zpJvQvPX7fMBdxiSjb/cb070DC1RIO+THkhQqJ4bxHhrwcvC5RME0iwnSo52a/i FSNzciw/SM37F5tMTjDs+F6iUT85K2IWyGkpAgMBAAGjggHTMIIBzzAfBgNVHSMEGDAWgBQJ wPL8C9qU21/+K9+omULPyeCtADAdBgNVHQ4EFgQU9SQ1EWwdWU0yBrPcbiR81rwNThUwDgYD VR0PAQH/BAQDAgWgMAwGA1UdEw
  • From Jeffrey Altman@21:1/5 to " on Sun Sep 12 07:49:57 2021
    To: kerberos@mit.edu (kerberos@mit.edu)

    On 9/11/2021 11:22 AM, Charles Hedrick (hedrick@rutgers.edu) wrote:
    I’d like to be able to use Kerberos SPNEGO at home. Unfortunately the Mac uses Heimdal.

    One premise of this thread is that Apple uses Heimdal as developed at

       https://www.heimdal.software/ aka https://github.com/heimdal/

    Apple does not.  Apple uses a fork from Heimdal circa 2008.   Apple publishes its changes and some of them are manually cloned into

      https://github.com/heimdal/heimdal

    but most are not.  

    We don’t currently explore our Kerberos servers to the Internet, but we do have an https proxy for MIT kerberos. Heimal apparently has its own HTTP proxy. Does anyone know of software to implement the proxy?
    I believe the question that should be asked is

      "Can an https proxy client compatible with MIT Kerberos be implemented
    for Heidmal?"

    The answer is "yes", but someone would need to development the
    implementation and submit a pull request.

    Jeffrey Altman



    MIAGCSqGSIb3DQEHAqCAMIACAQExDzANBglghkgBZQMEAgEFADCABgkqhkiG9w0BBwEAAKCC DJowggYBMIIE6aADAgECAhBAAWz+KYD2VMyFQOAs831nMA0GCSqGSIb3DQEBCwUAMDoxCzAJ BgNVBAYTAlVTMRIwEAYDVQQKEwlJZGVuVHJ1c3QxFzAVBgNVBAMTDlRydXN0SUQgQ0EgQTEy MB4XDTE5MDkwNDIxMjM0OFoXDTIyMTEwMjIxMjM0OFowgZUxNTAzBgNVBAsMLFZlcmlmaWVk IEVtYWlsOiBqYWx0bWFuQHNlY3VyZS1lbmRwb2ludHMuY29tMSswKQYJKoZIhvcNAQkBFhxq YWx0bWFuQHNlY3VyZS1lbmRwb2ludHMuY29tMS8wLQYKCZImiZPyLGQBARMfQTAxNDEwRDAw MDAwMTZDRkUyOTgwRTQwMDAwMzlFQjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEB ALRdw150e8iZjFFewsrI/Q5nQtYINFrVpOdYR5RnrrNUvwRrBkkYcFwNWP/wzHOPiaFgthaX ydoQXKqFH0gZ6EaipfJ1L/r8NKAELVf1mTY7Yw+M6EuApsT9X8Ix6DPyhRc9D/rZ4KuBaszA gdpqdBYkkNlcogKPuM6jCzCHfOW3l9Hj1P98GjLmvhK7bDV56kz5NP13rFYe8dln9dvAKY/a MS1Ghrmvuu2VudoYgPPMXYWnhtrLhxuvLiGUXrKissrBuh3JedDdmSAPNrKxpgVP2m7TrH3u 4FY+MFO+Vv8Z9aGtz5FRdLObgQpq1IyQfoMBJtgqBeqaCkuQGCSJo/UCAwEAAaOCAqUwggKh MA4GA1UdDwEB/wQEAwIFoDCBhAYIKwYBBQUHAQEEeDB2MDAGCCsGAQUFBzABhiRodHRwOi8v Y29tbWVyY2lhbC5vY3NwLmlkZW50cnVzdC5jb20wQgYIKwYBBQUHMAKGNmh0dHA6Ly92YWxp ZGF0aW9uLmlkZW50cnVzdC5jb20vY2VydHMvdHJ1c3RpZGNhYTEyLnA3YzAfBgNVHSMEGDAW gBSkc9rvaTWKdcygGXsIMvhrieRC7DAJBgNVHRMEAjAAMIIBLAYDVR0gBIIBIzCCAR8wggEb BgtghkgBhvkvAAYLATCCAQowSgYIKwYBBQUHAgEWPmh0dHBzOi8vc2VjdXJlLmlkZW50cnVz dC5jb20vY2VydGlmaWNhdGVzL3BvbGljeS90cy9pbmRleC5odG1sMIG7BggrBgEFBQcCAjCB rgyBq1RoaXMgVHJ1c3RJRCBDZXJ0aWZpY2F0ZSBoYXMgYmVlbiBpc3N1ZWQgaW4gYWNjb3Jk YW5jZSB3aXRoIApJZGVuVHJ1c3QncyBUcnVzdElEIENlcnRpZmljYXRlIFBvbGljeSBmb3Vu ZCBhdCBodHRwczovL3NlY3VyZS5pZGVudHJ1c3QuY29tL2NlcnRpZmljYXRlcy9wb2xpY3kv dHMvaW5kZXguaHRtbDBFBgNVHR8EPjA8MDqgOKA2hjRodHRwOi8vdmFsaWRhdGlvbi5pZGVu dHJ1c3QuY29tL2NybC90cnVzdGlkY2FhMTIuY3JsMCcGA1UdEQQgMB6BHGphbHRtYW5Ac2Vj dXJlLWVuZHBvaW50cy5jb20wHQYDVR0OBBYEFM/QuJwMCA6dvJZmfEpnpbYkoY3iMB0GA1Ud JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDBDANBgkqhkiG9w0BAQsFAAOCAQEAuAcupiA1Vgby jH7ldWXvQAHFyI3a2WUfHyPlPkVnFdyRKv8Fo4qwZ6xkHq49lnV6kRKVn88CCFCYb4XOpzUl Q0JXqzD+PYpM90MEixEpFZTVhRnnA9ypB87K16Pq2zEGmC6dyKYFQTS6lWiO5g5/xOPnO6mm mz3lRGXMuLKNSwThnR4fQcFJjV/yuJ0wCdFSHPRflxf3dZ44fkd/AFnA/99w+HpONT94ZR6k foemXuAHnYE9FmOotguxzAIcldwrR795fHTDDyRkiRqwVE7lh5YSkX1kImPMYuDTUw21D7HI mEJsb/+b3HGUpRrnrVOl9UXadEunddldgOp7UB2wUzCCBpEwggR5oAMCAQICEQD53lZ/yU0M d3D5YBtS2hU7MA0GCSqGSIb3DQEBCwUAMEoxCzAJBgNVBAYTAlVTMRIwEAYDVQQKEwlJZGVu VHJ1c3QxJzAlBgNVBAMTHklkZW5UcnVzdCBDb21tZXJjaWFsIFJvb3QgQ0EgMTAeFw0xNTAy MTgyMjI1MTlaFw0yMzAyMTgyMjI1MTlaMDoxCzAJBgNVBAYTAlVTMRIwEAYDVQQKEwlJZGVu VHJ1c3QxFzAVBgNVBAMTDlRydXN0SUQgQ0EgQTEyMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A MIIBCgKCAQEA0ZFNPM8KJzSSrkvpmtQla3ksT+fq1s9c+Ea3YSC/umUkygSm9UkkOoaoNjKZ oCx3wef1kwC4pQQV2XHk+AKR+7uMvnOCIw2cAVUP0/Kuy4X6miqaXGGVDTqwVjaFuFCRVVDT QoI2BTMpwFQi+O/TjD5+E0+TAZbkzsB7krk4YUbA6hFyT0YboxRUq9M2QHDb+80w53b1UZVO 1HS2Mfk9LnINeyzjxiXU/iENK07YvjBOxbY/ftAYPbv/9cY3wrpqZYHoXZc6B9/8+aVCNA45 FP3k+YuTDC+ZrmePQBLQJWnyS/QrZEdXsaieWUqkUMxPQKTExArCiP61YRYlOIMpKwIDAQAB o4ICgDCCAnwwgYkGCCsGAQUFBwEBBH0wezAwBggrBgEFBQcwAYYkaHR0cDovL2NvbW1lcmNp YWwub2NzcC5pZGVudHJ1c3QuY29tMEcGCCsGAQUFBzAChjtodHRwOi8vdmFsaWRhdGlvbi5p ZGVudHJ1c3QuY29tL3Jvb3RzL2NvbW1lcmNpYWxyb290Y2ExLnA3YzAfBgNVHSMEGDAWgBTt RBnA0/AGi+6ke75C5yZUyI42djAPBgNVHRMBAf8EBTADAQH/MIIBIAYDVR0gBIIBFzCCARMw ggEPBgRVHSAAMIIBBTCCAQEGCCsGAQUFBwICMIH0MEUWPmh0dHBzOi8vc2VjdXJlLmlkZW50 cnVzdC5jb20vY2VydGlmaWNhdGVzL3BvbGljeS90cy9pbmRleC5odG1sMAMCAQEagapUaGlz IFRydXN0SUQgQ2VydGlmaWNhdGUgaGFzIGJlZW4gaXNzdWVkIGluIGFjY29yZGFuY2Ugd2l0 aCBJZGVuVHJ1c3QncyBUcnVzdElEIENlcnRpZmljYXRlIFBvbGljeSBmb3VuZCBhdCBodHRw czovL3NlY3VyZS5pZGVudHJ1c3QuY29tL2NlcnRpZmljYXRlcy9wb2xpY3kvdHMvaW5kZXgu aHRtbDBKBgNVHR8EQzBBMD+gPaA7hjlodHRwOi8vdmFsaWRhdGlvbi5pZGVudHJ1c3QuY29t L2NybC9jb21tZXJjaWFscm9vdGNhMS5jcmwwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUF BwMEMA4GA1UdDwEB/wQEAwIBhjAdBgNVHQ4EFgQUpHPa72k1inXMoBl7CDL4a4nkQuwwDQYJ KoZIhvcNAQELBQADggIBAA3hgq7S+/TrYxl+D7ExI1Rdgq8fC9kiT7ofWlSaK/IMjgjoDfBb PGWvzdkmbSgYgXo8GxuAon9+HLIjNv68BgUmbIjwj/SYaVz6chA25XZdjxzKk+hUkqCmfOn/ twQJeRfxHg3I+0Sfwp5xs10YF0RobhrsCRne6OUmh9mph0fE3b21k90OVnx9Hfr+YAV4ISrT A6045zQTKGzb370whliPLFo+hNL6XzEty5hfdFaWKtHIfpE994CLmTJI4SEbWq40d7TpAjCm KCPIVPq/+9GqggGvtakM5K3VXNc9VtKPU9xYGCTDIYoeVBQ65JsdsdyM4PzDzAdINsv4vaF7 yE03nh2jLV7XAkcqad9vS4EB4hKjFFsmcwxa+ACUfkVWtBaWBqN4f/o1thsFJHEAu4Q6oRB6 mYkzqrPigPazF2rgYw3lp0B1gSzCRj+jRtErIVdMPeZ2p5Fdx7SNhBtabuhqmpJkFxwW9SBg 6sHvy0HpzVvEiBpApFKG1ZHXMwzQl+pR8P27wWDsblJU7Qgb8ZzGRK9l5GOFhxtN+oXZ4CCm unLMtaZ2vSai7du/VKrg64GGZNAKerEBevjJVNFgeSnmUK9GB4kCZ7U5NWlU+2H87scntW4Q /0Y6vqQJcJeaMHg/dQnahTQ2p+hB1xJJK32GWIAucTFMSOKLbQHadIOiMYIDFDCCAxACAQEw TjA6MQswCQYDVQQGEwJVUzESMBAGA1UEChMJSWRlblRydXN0MRcwFQYDVQQDEw5UcnVzdElE IENBIEExMgIQQAFs/imA9lTMhUDgLPN9ZzANBglghkgBZQMEAgEFAKCCAZcwGAYJKoZIhvcN AQkDMQsGCSqGSIb3DQEHATAcBgkqhkiG9w0BCQUxDxcNMjEwOTEyMTE0OTU3WjAvBgkqhkiG 9w0BCQQxIgQgW6fATnKK9Yof5Jb5GkW0UbpuJQiCDqbtDEhLnwZEv4gwXQYJKwYBBAGCNxAE MVAwTjA6MQswCQYDVQQGEwJVUzESMBAGA1UEChMJSWRlblRydXN0MRcwFQYDVQQDEw5UcnVz dElEIENBIEExMgIQQAFs/imA9lTMhUDgLPN9ZzBfBgsqhkiG9w0BCRACCzFQoE4wOjELMAkG A1UEBhMCVVMxEjAQBgNVBAoTCUlkZW5UcnVzdDEXMBUGA1UEAxMOVHJ1c3RJRCBDQSBBMTIC EEABbP4pgPZUzIVA4CzzfWcwbAYJKoZIhvcNAQkPMV8wXTALBglghkgBZQMEASowCwYJYIZI AWUDBAECMAoGCCqGSIb3DQMHMA4GCCqGSIb3DQMCAgIAgDANBggqhkiG9w0DAgIBQDAHBgUr DgMCBzANBggqhkiG9w0DAgIBKDANBgkqhkiG9w0BAQEFAASCAQAwUei8pcx5f4r+aSJq6uwk oLX7Mzd830PiIiaQNMwrvSxUzMGgAYUSsgjbgP1sHWereN6pCvBJ0zqon9dAWGEVHjtewfyS Yhk2ui5Ukj4vhY3+XQndQ7epmXTId5jBGEN7Ape0OFmMTwJ+k64j/lTnkHZn8VFKTQyjryqH ILuuPutn/DZC8NAakGbETyxgDAqy6m0SNHqHg5rwGP05cWSC8E9XMSFzCX0Hx0KgWH/xTnkp Pr0uWgsHmqUkdc107Py6+hYf7XdlmhDehiwuAwthgJ3ZMUZkkXkwWESHB/WZxjFC0Rg1qFuj f9AKHjjatziC8Jzzpm1/tbGsRS1o39wbAAAAAAAA

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Ken Hornstein@21:1/5 to Charles Hedrick on Sun Sep 12 11:11:18 2021
    Copy: kerberos@mit.edu (kerberos@mit.edu)

    The hope is that the proxy will read requests and validate them. Thus
    passing through the proxy would be less dangerous that exposing port 88 >directly. If that’s not true, we should consider the risks of making
    port 88 available, or give up.

    I'm curious as to exactly what validation for requests you think the
    HTTP proxy is doing that the KDC is not. The only meaningful validation
    I can think of would require the proxy to handle all of the functions
    of the KDC itself (and honestly, I suspect the only validation that the
    proxy is doing is, "Looks like a valid HTTP request that doesn't have
    any of the common SQL injection attacks in the URL"). I mean, I've
    certainly been in the situation where we are required to do something
    dumb to satisfy a overly-broad security requirement, but I always try
    to acknowledge the dumbness.

    --Ken

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Benjamin Kaduk@21:1/5 to Jeffrey Altman on Sun Sep 12 10:01:07 2021
    Copy: kerberos@mit.edu (kerberos@mit.edu)

    On Sun, Sep 12, 2021 at 07:49:57AM -0400, Jeffrey Altman wrote:
    On 9/11/2021 11:22 AM, Charles Hedrick (hedrick@rutgers.edu) wrote:
    We don’t currently explore our Kerberos servers to the Internet, but we do have an https proxy for MIT kerberos. Heimal apparently has its own HTTP proxy. Does anyone know of software to implement the proxy?
    I believe the question that should be asked is

      "Can an https proxy client compatible with MIT Kerberos be implemented
    for Heidmal?"

    My understanding is that MIT Kerberos just implemented compatibility for Microsoft's MS-KKDCP protocol, https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-kkdcp/5bcebb8d-b747-4ee5-9453-428aec1c5c38

    -Ben

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Grant Taylor@21:1/5 to Jeffrey Altman on Sun Sep 12 10:53:40 2021
    On 9/12/21 5:49 AM, Jeffrey Altman wrote:
    The answer is "yes", but someone would need to development the implementation and submit a pull request.

    Here's a silly thought.

    What about using something like socat to listen on local port 88 and
    have it use the upstream proxy via CONNECT requests (possibly with authentication) to reach the internal KDC, thus making the socat duck
    quack as if it's the KDC.

    It's a bit of a hack. But would it suffice for limited use?



    --
    Grant. . . .
    unix || die


    MIAGCSqGSIb3DQEHAqCAMIACAQExDzANBglghkgBZQMEAgEFADCABgkqhkiG9w0BBwEAAKCC CzkwggUhMIIECaADAgECAhA/wgXwQl9mDHSg5enGHBeSMA0GCSqGSIb3DQEBCwUAMIGWMQsw CQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxm b3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxPjA8BgNVBAMTNVNlY3RpZ28gUlNBIENs aWVudCBBdXRoZW50aWNhdGlvbiBhbmQgU2VjdXJlIEVtYWlsIENBMB4XDTIwMTExNjAwMDAw MFoXDTIxMTExNjIzNTk1OVowKzEpMCcGCSqGSIb3DQEJARYaZ3RheWxvckB0bmV0Y29uc3Vs dGluZy5uZXQwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDM6cGNMlSUFPM3zVw+ VgSslz2QRtMj+FerQ0DpmgbhUzqm5hMRe0hMA2OBf41HDAeOV0RKcLx2+HozHlyQST2xagOX xiv91aEXezh8bEBfnOI564Ej/JfusomfoM7ByVXcLp3K3fOssHos6IXiAD6WT+jcRs7Cg+Gl bYyoDLDLXw4i/N+YRcp3JrwT+4g/i//wAea1qTEd+ZnfcqtvCHaiJrr16xEpzuraLcmH5qtN /c+5kkRN3zpJvQvPX7fMBdxiSjb/cb070DC1RIO+THkhQqJ4bxHhrwcvC5RME0iwnSo52a/i FSNzciw/SM37F5tMTjDs+F6iUT85K2IWyGkpAgMBAAGjggHTMIIBzzAfBgNVHSMEGDAWgBQJ wPL8C9qU21/+K9+omULPyeCtADAdBgNVHQ4EFgQU9SQ1EWwdWU0yBrPcbiR81rwNThUwDgYD VR0PAQH/BAQDAgWgMAwGA1UdEw
  • From Charles Hedrick@21:1/5 to Grant Taylor on Tue Sep 28 16:31:54 2021
    Copy: kerberos@mit.edu

    If all the proxy is doing is forwarding content, it might work. But in that case it’s not obvious how much security we’re gaining by the proxy. It may be that just enabling access directly to port 88 would be as good. (I control the network, mostly.)
    Any sense how risky it is to expose port 88 to the internet?

    On Sep 12, 2021, at 12:53 PM, Grant Taylor <gtaylor@tnetconsulting.net> wrote:

    On 9/12/21 5:49 AM, Jeffrey Altman wrote:
    The answer is "yes", but someone would need to development the implementation and submit a pull request.

    Here's a silly thought.

    What about using something like socat to listen on local port 88 and have it use the upstream proxy via CONNECT requests (possibly with authentication) to reach the internal KDC, thus making the socat duck quack as if it's the KDC.

    It's a bit of a hack. But would it suffice for limited use?



    --
    Grant. . . .
    unix || die

    ________________________________________________
    Kerberos mailing list Kerberos@mit.edu https://mailman.mit.edu/mailman/listinfo/kerberos

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Ken Hornstein@21:1/5 to Charles Hedrick on Tue Sep 28 21:58:22 2021
    Copy: gtaylor@tnetconsulting.net (Grant Taylor)
    Copy: kerberos@mit.edu

    If all the proxy is doing is forwarding content, it might work. But in
    that case it’s not obvious how much security we’re gaining by the
    proxy. It may be that just enabling access directly to port 88 would be
    as good. (I control the network, mostly.) Any sense how risky it is to
    expose port 88 to the internet?

    For what it's worth, we do. Protocol wise, Kerberos is literally designed
    to operate over untrusted networks, so I'm fine with the protocol being accessible from the Internet.

    Implementation-wise, the people I personally know who do that are running
    one of the open-source Kerberos implementations. It is my understanding
    that Microsoft does NOT recommend opening the Kerberos port on your
    domain controller to the Internet, but if you are making it available via
    a web proxy I'm not sure how that doesn't qualify. I'm not sure why
    that is Microsoft's guidance (note that I have only heard that second
    hand and I have not verified it).

    --Ken

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Grant Taylor@21:1/5 to Charles Hedrick on Wed Sep 29 13:41:31 2021
    On 9/28/21 2:31 PM, Charles Hedrick wrote:
    If all the proxy is doing is forwarding content, it might work. But
    in that case it’s not obvious how much security we’re gaining
    by the proxy. It may be that just enabling access directly to port
    88 would be as good. (I control the network, mostly.) Any sense how
    risky it is to expose port 88 to the internet?

    I was assuming that the proxy would have it's own authentication
    requirements. Thus the proxy would act somewhat like a bouncer in front
    of the KDC.

    Somewhat like putting the KDC behind a VPN or SPI w/ port knocking. --
    Allow people that have some modicum of knowledge access to the KDC while preventing any Joe Random on the Internet from accessing the KDC.



    --
    Grant. . . .
    unix || die


    MIAGCSqGSIb3DQEHAqCAMIACAQExDzANBglghkgBZQMEAgEFADCABgkqhkiG9w0BBwEAAKCC CzkwggUhMIIECaADAgECAhA/wgXwQl9mDHSg5enGHBeSMA0GCSqGSIb3DQEBCwUAMIGWMQsw CQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxm b3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxPjA8BgNVBAMTNVNlY3RpZ28gUlNBIENs aWVudCBBdXRoZW50aWNhdGlvbiBhbmQgU2VjdXJlIEVtYWlsIENBMB4XDTIwMTExNjAwMDAw MFoXDTIxMTExNjIzNTk1OVowKzEpMCcGCSqGSIb3DQEJARYaZ3RheWxvckB0bmV0Y29uc3Vs dGluZy5uZXQwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDM6cGNMlSUFPM3zVw+ VgSslz2QRtMj+FerQ0DpmgbhUzqm5hMRe0hMA2OBf41HDAeOV0RKcLx2+HozHlyQST2xagOX xiv91aEXezh8bEBfnOI564Ej/JfusomfoM7ByVXcLp3K3fOssHos6IXiAD6WT+jcRs7Cg+Gl bYyoDLDLXw4i/N+YRcp3JrwT+4g/i//wAea1qTEd+ZnfcqtvCHaiJrr16xEpzuraLcmH5qtN /c+5kkRN3zpJvQvPX7fMBdxiSjb/cb070DC1RIO+THkhQqJ4bxHhrwcvC5RME0iwnSo52a/i FSNzciw/SM37F5tMTjDs+F6iUT85K2IWyGkpAgMBAAGjggHTMIIBzzAfBgNVHSMEGDAWgBQJ wPL8C9qU21/+K9+omULPyeCtADAdBgNVHQ4EFgQU9SQ1EWwdWU0yBrPcbiR81rwNThUwDgYD VR0PAQH/BAQDAgWgMAwGA1UdEw
  • From Simo Sorce@21:1/5 to Grant Taylor on Wed Sep 29 16:12:26 2021
    To: kerberos@mit.edu

    On Wed, 2021-09-29 at 13:41 -0600, Grant Taylor wrote:
    On 9/28/21 2:31 PM, Charles Hedrick wrote:
    If all the proxy is doing is forwarding content, it might work. But
    in that case it’s not obvious how much security we’re gaining
    by the proxy. It may be that just enabling access directly to port
    88 would be as good. (I control the network, mostly.) Any sense how
    risky it is to expose port 88 to the internet?

    I was assuming that the proxy would have it's own authentication requirements. Thus the proxy would act somewhat like a bouncer in front
    of the KDC.

    Somewhat like putting the KDC behind a VPN or SPI w/ port knocking. --
    Allow people that have some modicum of knowledge access to the KDC while preventing any Joe Random on the Internet from accessing the KDC.

    In truth, most of the value for the proxy (MS-KKDCP style) is that it
    uses a standard port open in most places, and wraps everything in TLS
    so that most inspection from broken HTTP middleboxes is prevented).

    There is the added TLS channel encryption that can prevent a lot of
    MITM as well given the client SHOULD validate the certificate of the
    proxy.

    HTH,
    Simo.

    --
    Simo Sorce
    RHEL Crypto Team
    Red Hat, Inc

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)