RT RT/krbdev.mit.edu: Ticket #7707 Credential cache API does not support atomic reinitialization Signed in as guest.

[Home] [Search] [Configuration]

[Display] [History] [Basics] [Dates] [People] [Links] [Jumbo]


 The Basics  
0 min

 Keyword Selections  

Depends on:
Depended on by:

Refers to:
Referred to by:
Created: Sun Sep 22 17:27:45 2013
Starts: Not set
Started: Not set
Last Contact: Not set
Due: Not set
Updated: Wed May 29 15:09:46 2019 by ghudson


 More about Greg Hudson  
Comments about this user:
No comment entered about this user
This user's 25 highest priority tickets:

History   Display mode: [Brief headers] [Full headers]
      Sun Sep 22 17:27:45 2013  ghudson - Ticket created    
Subject: Credential cache API does not support atomic reinitialization

If a group of processes are using a credential cache for client
operations which require service tickets, and another process
reinitializes the cache, there is a brief window of time where the
former group of processes will fail because the cache is empty.

This failure window occurs because the ccache API does not provide any
way to  initialize a cache and place credentials in it atomically.
There is a workaround for FILE ccaches on Unix-like systems where you
create a ccache in the same directory and rename it into place, but it
violates the ccache abstraction barrier.

Here are several candidate solutions along with reasons why some of them
might not work:

1. Provide a krb5_cc_init_with_cred() which is defined to atomically
reinitialize the ccache and place one specified credential in it,
presumably a TGT.  This would be easy for a caller to use, but would
still leave open a window where the TGT is present but config entries
(such as "FAST is available") are not.  So it's not a complete solution.

2. Define krb5_cc_lock() and krb5_cc_unlock() to lock the ccache across
processes (currently it just locks a mutex in the handle for most
types), and provide an API to initialize a ccache with the lock held.
This might be difficult to implement for some ccache types, such as

3. Provide a way for krb5_cc_new_unique() to make a ccache within the
same atomic-replacement domain as an existing ccache, perhaps via the
currently-unused hint parameter, and then make krb5_cc_move() try to use
atomic replacement when possible.

4. Define krb5_cc_move() to be atomic in all cases (or perhaps only when
the source ccache type is MEMORY, although it shouldn't really matter),
whether the implementation uses locks or atomic replacement.

There are some related credential cache concurrency issues, such as the
behavior of iteration and the IAKERB state machine across cache
reinitialization.  Those are separate issues; this ticket is only about
supporting atomic reinitialization in the API.

Download (untitled) 1.9k
      Wed May 29 15:09:46 2019  ghudson - Comments added    
In IRC Nico suggested a fifth option, which I think is a little
outside the box but still worth considering.  My interpretation is:

5. On krb5_cc_initialize(), do nothing externally visible (or at
least no more visible than creating a temporary file).  When the
first non-config credential entry is stored, then atomically replace
the ccache as it is visible to other handles.

There are two caveats to this approach:

A. For this approach to work, the first non-config credential entry
to be stored must be the TGT, or the sole service ticket for non-TGT
ccaches, and  important config entries must be written before that
credential is written.

This property is likely already true for creating uses like kinit and
gss_acquire_cred_with_password().  But when the cache is created by a
copy operation, as it is with gss_store_cred_into(), this property
relies on iteration (from the source ccache) preserving order, at
least loosely.  Our implementation of the MEMORY ccache type
currently reverses order during iteration; that would need to be
changed, and other ccache types such as KEYRING would need to be
inventoried to determine if they preserve order.

B. This approach does requires the cache to be created via a single
handle, up through storing the first non-cred entry.  For example, a
caller who creates a cache, initializes it, closes it, and then
passes the name to some other agent to fill in credentials will no
longer work.  A review of known Kerberos applications like kstart
would be indicated to make sure no one does this.

Download (untitled) 1.5k