Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Don't an authenticator in each outgoing notice #129

Open
davidben opened this issue Apr 5, 2014 · 1 comment
Open

Don't an authenticator in each outgoing notice #129

davidben opened this issue Apr 5, 2014 · 1 comment

Comments

@davidben
Copy link
Contributor

davidben commented Apr 5, 2014

This is silly. We should stop having to care if the authenticator gets too big. The server already remembers a key for every session by virtue of subscribing.

Karl's branch here is probably a good place to start:
https://github.com/zephyr-im/zephyr/tree/dev/kcr/red-right-hand

One potential nuisance with it is that it may make the session lifetime problem worse. Right now a session from an expired ticket can still receive messages but you can't send new ones (or even shut it down...). We should certainly allow ZCancelSubscription because that's just dumb. New subscriptions and sending new messages is less clear. It will make Roost's life much much easier, but it'd be even harder to revoke those things.

But short of better Kerberos primitives, maybe that's not a bad thing. Perhaps zephyr should just give up on being able to revoke at the Kerberos level and instead, say, let you send a "BOOT" message to the zephyrds to boot all sessions on your principal or all which match some hostname or IP or whatever.

@davidben
Copy link
Contributor Author

davidben commented Apr 5, 2014

BOOT

Maybe we could let you even query all your live sessions and stuff. Of course, all this depends on IS&T deploying zephyrd changes, but I bet that's more likely than them deploying KDC changes.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant