From: | Magnus Hagander <magnus(at)hagander(dot)net> |
---|---|
To: | "Henry B(dot) Hotz" <hotz(at)jpl(dot)nasa(dot)gov> |
Cc: | PostgreSQL-development <pgsql-hackers(at)postgresql(dot)org> |
Subject: | Re: Fwd: [PATCHES] Preliminary GSSAPI Patches |
Date: | 2007-05-01 20:06:06 |
Message-ID: | 46379DAE.7040008@hagander.net |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-hackers |
Henry B. Hotz wrote:
>
> On May 1, 2007, at 1:16 AM, Magnus Hagander wrote:
>
>> Henry B. Hotz wrote:
>>
>>>>> Would you like a new version of the patch with the incomplete
>>>>> functionality commented out (or otherwise removed)?
>>
>> Yes please :-) I was going to try to do one of those myself, but since
>> you already know your way around the code, please do it. And please go
>> for removing it alltogether instead of just commenting it out - it's in
>> the list archives and can be referred to there if/when we want to add it
>> back in.
>
> I can do that.
Thanks!
> Could I ask you, or someone else, to look at what needs to happen to
> configure? The way you capture `krb5-config --libs gssapi` into a
> variable is completely different in BSD and GNU make, and I don't know
> how to deal with that. (The configure logic for mod_auth_kerb suffers
> from that problem, too.) The README.GSSAPI file in the patch has
> reasonable notes, and it should be pretty simple otherwise.
I'll leave the autoconf-fu to someone else if possible, but I can look
at it later if nobody does (will look at the rest too).
The docs need to be moved from README into the proper docs as well, but
I can take care of that once the code is settled.
>> I'd also vote for changing the name of the "non encrypted" version to
>> just "gss" instead of "gss-np".
>
> I happen to disagree on this point. There are a whole class of attacks
> that become possible if the encryption from the original authentication
> exchange isn't used for the on-going channel encryption/integrity. They
> may be impossible in practice, but how many cans of worms do you want to
> deal with when you recommend a "secure" configuration to an average
> admin? I would rather not hide the distinction by changing the name
> that way.
>
> Also, if I *do* get the buffering disentangled and create a working
> "gss" mechanism, what would I call it if the name is already taken? At
> that point it would become the recommended mechanism unless high-volume
> performance made it impractical.
I would call them "gss" and "gss-sec". Or possibly "gss-enc". I think
that's a lot more clear than "gss-np" (something ending with -sec is a
giveaway)
But I won't fight for it, it's not that important to me :-)
(And whether it's recommended or not depends on the environment - there
are a cases where it's just unnecessary to add it. Say if you're
employing ipsec across your network, adding a second layer of encryption
will just make things slower for no gain - and it makes things more
complex. Even if you're not talking high volume.)
//Magnus
From | Date | Subject | |
---|---|---|---|
Next Message | Magnus Hagander | 2007-05-01 20:07:47 | Re: Fwd: [PATCHES] Preliminary GSSAPI Patches |
Previous Message | Josh Berkus | 2007-05-01 20:00:45 | Re: Fwd: [PATCHES] Preliminary GSSAPI Patches |