Here's a small patch that disables the libkrb5.so replay cache
authorjerry <jerry@0c0555d6-39d7-0310-84fc-f1cc0bd64818>
Wed, 13 Jun 2007 20:49:20 +0000 (20:49 +0000)
committerjerry <jerry@0c0555d6-39d7-0310-84fc-f1cc0bd64818>
Wed, 13 Jun 2007 20:49:20 +0000 (20:49 +0000)
commitcada899e62a25f74d6405ee4df8ff8235e70d006
tree0d56ff550d7a20ccd61dec632233406fa125d94a
parentc466996086b841910a06fa64539a69a989ff8523
Here's a small patch that disables the libkrb5.so replay cache
when verifying a ticket from winbindd_pam.c.

I've found during multiple, fast, automated SSH logins (such
as from a cron script) that the replay cache in MIT's krb5
lib will occasionally fail the krb5_rd_req() as a replay attack.

There seems to be a small window during which the MIT krb5
libs could reproduce identical time stamps for ctime and cusec
in the authenticator since Unix systems only give back
milli-seconds rather than the micro-seconds needed by the
authenticator.  Checked against MIT 1.5.1.  Have not
researched how Heimdal does it.

My thinking is that if someone can spoof the KDC and TDS
services we are pretty hopeless anyways.

git-svn-id: svn+ssh://svn.samba.org/data/svn/samba/branches/SAMBA_3_0@23474 0c0555d6-39d7-0310-84fc-f1cc0bd64818
source/libads/kerberos_verify.c
source/nsswitch/winbindd_pam.c
source/smbd/sesssetup.c
source/utils/ntlm_auth.c