MIT, Heimdal and Re: [PATCH] Log transaction and authentication durations.

Andrew Bartlett abartlet at samba.org
Wed Jun 20 06:55:55 UTC 2018


On Wed, 2018-06-20 at 08:04 +0200, Andreas Schneider wrote:
> On Wednesday, 20 June 2018 07:09:54 CEST Andrew Bartlett via samba-technical 
> wrote:
> > 
> > Andreas:  Just a heads-up that this while I've confirmed this builds
> > with MIT, you will probably need to take it into account when getting
> > the auditing enabled for the MIT KDC.
> 
> Quoting you from the 'heimdal: lib/krb5: do not fail set_config_files due to 
> parse error' thread:
> 
>     Once patches are in upstream git master (no need to wait for a release)
>     they can be back-ported.  This helps for when I get back to updating
>     our copy so we don't regress, so the effort is much appriciated.
> 
> The upstream hdb_auth_status callback takes 3 arguments, the one in the Samba 
> code takes 7 arguments!
> 
> You're obviously already in the Kerberos business and maintain a fork of 
> Heimdal! This seems to go in without any Heimdal upstream discussion if this 
> feature for testing is worth changing the HDB API or if there are better ways.

Yes, in the short term we have a fork of Heimdal, and clearly I'm
asking to do as I say, not as I do.  

What I will say is this:  Patches that either are not submitted and
accepted upstream or don't have comprehensive unit tests inevitably be
dropped or lost when I next do the upgrade.  Leaving cleanup and
similar patches just in our tree is simply asking for them to get
missed. 

While hardly a good enough reason, the reason the audit logging wasn't
done in Heimdal first is that:
 - upstream Heimdal has restructured that area of the code such that a
simple forward/backport is not possible
 - there is no public testsuite in upstream Heimdal for the hooks,
originally added for Apple (I think). 

So, yes, I plan to deal with this element of technical debt when I get
back to the re-sync.  While there will still be no upstream test, at
least then we can test it by proxy of Samba's tests.  

That is, it is not a hard and fast rule, but the more we follow it the
more practical my upgrade job is, so I just ask nicely.

> I think we will just not have auth logging support with MIT Kerberos or as an 
> untested feature.

OK, I've added this to the list of what isn't supported in MIT, (our
users do ask from time to time):
 
https://wiki.samba.org/index.php/Running_a_Samba_AD_DC_with_MIT_Kerbero
s_KDC#Known_Limitations_of_MIT_Kerberos_Support_in_Samba

The issue with the 'just ignore some features' approach is that it
makes getting out of Heimdal even harder, and so has us remaining in
this 'Keberos business'.  

What we do need is feature parity, comprehensive testing parity and
automated testing, as discussed in this thread:
https://lists.samba.org/archive/samba-technical/2017-November/123755.html

Andrew Bartlett
-- 
Andrew Bartlett                       http://samba.org/~abartlet/
Authentication Developer, Samba Team  http://samba.org
Samba Developer, Catalyst IT          http://catalyst.net.nz/services/samba




More information about the samba-technical mailing list