From: | Jacob Champion <jacob(dot)champion(at)enterprisedb(dot)com> |
---|---|
To: | Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us> |
Cc: | Chris Gooch <cgooch(at)bamfunds(dot)com>, "pgsql-bugs(at)lists(dot)postgresql(dot)org" <pgsql-bugs(at)lists(dot)postgresql(dot)org> |
Subject: | Re: [EXT] Re: GSS Auth issue when user member of lots of AD groups |
Date: | 2025-05-27 22:05:43 |
Message-ID: | CAOYmi+n0RW6uDOpz8sgLHoc0gZB+uTPERoCoP1xM3Szpajsi3w@mail.gmail.com |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-bugs pgsql-committers |
On Sat, May 24, 2025 at 12:37 PM Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us> wrote:
> OK, here's a set of draft patches for that.
I haven't reviewed the code in detail yet, but here are some thoughts
on your notes:
> * Is 128kB unreasonably large? I think we may want some daylight
> above 64kB, but I'm not sure how much.
Having a different token limit between gssenc and non-gssenc users
doesn't seem right to me; if you somehow start relying on the much
larger tokens with gssenc, and later want to switch to TLS, you'd
suddenly be out of luck.
(A larger token does apparently help with unconstrained delegation.
But that page I shared from Microsoft upthread is saying that the
deprecation of unconstrained delegation, plus SID compression, means
that 48k should be good enough for anyone. Whether or not that's true
in practice, I don't know, and I think 64k should definitely be our
minimum.)
> * I concluded that the error report that's being given for the case
> is just flat-out bogus.
+1
> * It seems pretty silly to have separate symbols for
> PQ_GSS_SEND_BUFFER_SIZE and PQ_GSS_RECV_BUFFER_SIZE
> when we're requiring those to be the same, so I merged
> them into one symbol PQ_GSS_MAX_PACKET_SIZE.
That seems fine.
> * The backend's secure_open_gssapi allowed received initialization packets
> to be up to buffer-size long, whereas libpq will choke sending them
> if they're more than buffer-size minus sizeof(uint32). This isn't
> actually a bug, since the buffer management is handled in such a way
> that it's safe, but it seems very inconsistent. I changed the limit
> to subtract off sizeof(uint32) in all cases, which incidentally
> allowed removing one variant of the translatable message string.
That discrepancy is confusing to me. Is there a way to standardize
both sides in the other direction, so that they actually handle tokens
up to the "max size"?
--Jacob
From | Date | Subject | |
---|---|---|---|
Next Message | Tom Lane | 2025-05-27 22:15:29 | Re: [EXT] Re: GSS Auth issue when user member of lots of AD groups |
Previous Message | Laurenz Albe | 2025-05-27 21:39:02 | Re: SIMILAR TO expressions translate wildcards where they shouldn't |
From | Date | Subject | |
---|---|---|---|
Next Message | Tom Lane | 2025-05-27 22:15:29 | Re: [EXT] Re: GSS Auth issue when user member of lots of AD groups |
Previous Message | Bruce Momjian | 2025-05-27 21:51:16 | pgsql: doc PG 18 relnotes: add removal details to MD5 item |