Skip to content

Commit 8dff2f2

Browse files
committed
For Kerberos testing, disable reverse DNS lookup
In our Kerberos test suite, there isn't much need to worry about the normal canonicalization that Kerberos provides by looking up the reverse DNS for the IP address connected to, and in some cases it can actively cause problems (eg: a captive portal wifi where the normally not resolvable localhost address used ends up being resolved anyway, and not to the domain we are using for testing, causing the entire regression test to fail with errors about not being able to get a TGT for the remote realm for cross-realm trust). Therefore, disable it by adding rdns = false into the krb5.conf that's generated for the test. Reviewed-By: Heikki Linnakangas Discussion: https://postgr.es/m/Y/QD2zDkDYQA1GQt@tamriel.snowman.net
1 parent 590a075 commit 8dff2f2

File tree

1 file changed

+12
-0
lines changed

1 file changed

+12
-0
lines changed

src/test/kerberos/t/001_auth.pl

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -100,6 +100,17 @@
100100
or BAIL_OUT("could not get Kerberos version");
101101
$krb5_version = $1;
102102

103+
# Build the krb5.conf to use.
104+
#
105+
# Explicitly specify the default (test) realm and the KDC for
106+
# that realm to avoid the Kerberos library trying to look up
107+
# that information in DNS, and also because we're using a
108+
# non-standard KDC port.
109+
#
110+
# Reverse DNS is explicitly disabled to avoid any issue with a
111+
# captive portal or other cases where the reverse DNS succeeds
112+
# and the Kerberos library uses that as the canonical name of
113+
# the host and then tries to acquire a cross-realm ticket.
103114
append_to_file(
104115
$krb5_conf,
105116
qq![logging]
@@ -108,6 +119,7 @@
108119
109120
[libdefaults]
110121
default_realm = $realm
122+
rdns = false
111123
112124
[realms]
113125
$realm = {

0 commit comments

Comments
 (0)