Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 137435 - why is --enable-dns-for-realm enabled by default in mit-krb5 ebuild
Summary: why is --enable-dns-for-realm enabled by default in mit-krb5 ebuild
Status: RESOLVED INVALID
Alias: None
Product: Gentoo Linux
Classification: Unclassified
Component: New packages (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Kerberos Maintainers
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2006-06-20 15:09 UTC by Paul B. Henson
Modified: 2006-06-22 12:24 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Paul B. Henson 2006-06-20 15:09:43 UTC
How come --enable-dns-for-realm is enabled by default in the mit-krb5 ebuild? According to the documentation, using DNS for realm mapping is not currently secure, and they recommend against it. It would seem better to have it disabled by default, and have a local use flag for people who know what they're doing who want it on.
Comment 1 Emanuele Giaquinta (RETIRED) gentoo-dev 2006-06-22 02:57:34 UTC
I do not agree, see krb5_get_default_realm in src/lib/krb5/os/def_realm.c; quoting the docs:

`--enable-dns-for-realm'
     Enable the use of DNS to look up a host's Kerberos realm, or a
     realm's KDCs, if the information is not provided in krb5.conf.

It is a fallback, it is used only if the realm is not set in krb5.conf.
Comment 2 Paul B. Henson 2006-06-22 12:24:40 UTC
Okay, I had missed the fact that DNS was only used if the mappings were not explicitly listed in the krb5.conf file, and the part in the documentation that said:
 
"The second mechanism works by looking up the information in special TXT records in the Domain Name Service. This is currently not used by default because security holes could result if the DNS TXT records were spoofed."

gave me some concerns. Assuming any important realms were appropriately configured in the krb5.conf, I concede that enabling this only provides extra functionality and should not generate security concerns in a correctly configured setup. I will go ahead and close this bug out as invalid, thanks for taking the time to look into it...