Looks like it might also be in the global master_keyblock in the 
server_kdb.c file.

Chris


------ Original Message ------
From: "Chris Hecker" <chec...@d6.com>
To: "Nico Williams" <n...@cryptonector.com>
Cc: "Harshawardhan Kulkarni" <harshawardhan...@gmail.com>; 
"kerberos@mit.edu" <kerberos@mit.edu>
Sent: 2020-06-11 15:54:32
Subject: Re[2]: MIT Kerberos Master principal deletion

>
> > I don't think it would make it harder.
>
>I just mean because you won't be able to set a breakpoint at a function that 
>uses the key, you'll have to actually chase it around in memory (assuming you 
>use something like gcore to dump it as fast as possible without regard to 
>where it is executing when it's dumped).
>
>If I was doing this live, I'd set a breakpoint on some function that used the 
>key to decrypt and then inspect there, but with a core file you'll need to 
>make sure you can find all the structures first.
>
>Is realm_mkey in the kdc_realm_data struct the one he wants?
>
>Chris
>
>------ Original Message ------
>From: "Nico Williams" <n...@cryptonector.com>
>To: "Chris Hecker" <chec...@d6.com>
>Cc: "Harshawardhan Kulkarni" <harshawardhan...@gmail.com>; "kerberos@mit.edu" 
><kerberos@mit.edu>
>Sent: 2020-06-11 15:31:28
>Subject: Re: MIT Kerberos Master principal deletion
>
>>On Thu, Jun 11, 2020 at 10:19:39PM +0000, Chris Hecker wrote:
>>>  Maybe dump the core of the running process so you don't accidentally crash
>>>  it while trying to debug it live?  But that would make finding it in memory
>>>  even harder...
>>
>>I don't think it would make it harder.
>>
>>BTW, we should make it much harder to delete important principals...


________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to