Aucune description

Jonathan Turner 8d08c269ba todo note il y a 9 ans
GSSAPI 017bdf9859 spnego service il y a 9 ans
asn1tools 0bd461fc52 refactor app tag il y a 9 ans
client 8d08c269ba todo note il y a 9 ans
config f62ca44c30 comment update il y a 9 ans
credentials 28c696288e comment updates il y a 9 ans
crypto c467c01ced comment updates il y a 9 ans
iana d48bee35ed gssapi il y a 9 ans
keytab 05a18c7de2 http server spnego auth il y a 9 ans
messages a3580bba79 http service auth il y a 9 ans
service 017bdf9859 spnego service il y a 9 ans
testdata d91ab76148 client spnego working il y a 9 ans
testenv 0b79eacce6 service side il y a 9 ans
types a3580bba79 http service auth il y a 9 ans
.gitignore 95ab435b4c initial commit il y a 9 ans
LICENSE caee2dc83a Initial commit il y a 9 ans
README.md 4020cb33bc refine spnego client method il y a 9 ans
debug.go 017bdf9859 spnego service il y a 9 ans

README.md

gokrb5

This is work in progress and may have some issues.

Currently the following is working/tested:

  • Works with a KDC that supports PA FAST
  • Client side authentication to HTTP servers that implement SPNEGO using Kerberos 5

GoDoc

Implemented Encryption & Checksum Types

The currently implemented encrytion types are:

Implementation Encryption ID Checksum ID
aes128-cts-hmac-sha1-96 17 15
aes256-cts-hmac-sha1-96 18 16

Usage

Configuration

The gokrb5 libraries use the same krb5.conf configuration file format as MIT Kerberos, described here. Config instances can be created by loading from a file path or by passing a string, io.Reader or bufio.Scanner to the relevant method:

import "github.com/jcmturner/gokrb5/config"
cfg, err := config.Load("/path/to/config/file")
cfg, err := config.NewConfigFromString(krb5Str) //String must have appropriate newline separations
cfg, err := config.NewConfigFromReader(reader)
cfg, err := config.NewConfigFromScanner(scanner)

Keytab files

Standard keytab files can be read from a file or from a slice of bytes:

import 	"github.com/jcmturner/gokrb5/keytab"
ktFromFile, err := keytab.Load("/path/to/file.keytab")
ktFromBytes, err := keytab.Parse(b)

Kerberos Client

Create a client instance with either a password or a keytab:

import 	"github.com/jcmturner/gokrb5/client"
cl := client.NewClientWithPassword("username", "REALM.COM", "password")
cl := client.NewClientWithKeytab("username", "REALM.COM", kt)

Provide configuration to the client:

cl.WithConfig(cfg)

Login:

err := cl.Login

(Optional) Enable automatic refresh of Kerberos Ticket Granting Ticket (TGT):

cl.EnableAutoSessionRenewal()

Authenticate to a Service

Native Kerberos

Request a Serivce ticket for a Service Principal Name (SPN). This method will use the client's cache either returning a valid cached ticket, renewing a cached ticket with the KDC or requesting a new ticket from the KDC. Therefore the GetServiceTicket method can be continually used for the most efficient interaction with the KDC.

tkt, err := cl.GetServiceTicket("HTTP/host.test.gokrb5")
HTTP SPNEGO

Create the HTTP request object and then call the client's SetSPNEGOHeader method passing the Service Principal Name (SPN)

r, _ := http.NewRequest("GET", "http://host.test.gokrb5/index.html", nil)
cl.SetSPNEGOHeader(r)
HTTPResp, err := http.DefaultClient.Do(r)

References

RFCs

Useful Links

Thanks

  • Greg Hudson from the MIT Consortium for Kerberos and Internet Trust for providing useful advice.

Known Issues

Issue Worked around? References
Golang's ASN1 package cannot unmarshal into slice of asn1.RawValue Yes https://github.com/golang/go/issues/17321
Golang's ASN1 package cannot marshal into a GeneralString Yes - using https://github.com/jcmturner/asn1 https://github.com/golang/go/issues/18832
Golang's ASN1 package cannot marshal into slice of strings and pass stringtype parameter tags to members Yes - using https://github.com/jcmturner/asn1 https://github.com/golang/go/issues/18834
Golang's ASN1 package cannot marshal with application tags Yes