[37222] in Kerberos

home help back first fref pref prev next nref lref last post

Re: Account lockout / replication issue

daemon@ATHENA.MIT.EDU (Tom Yu)
Wed Sep 9 07:23:03 2015

From: Tom Yu <tlyu@mit.edu>
To: Mark =?utf-8?Q?Pr=C3=B6hl?= <mark@mproehl.net>
Date: Wed, 09 Sep 2015 07:22:42 -0400
In-Reply-To: <E46EA82B-52C4-4437-89CA-972D22C6CF92@mproehl.net> ("Mark
	=?utf-8?Q?Pr=C3=B6hl=22's?= message of "Tue, 8 Sep 2015 15:21:06 +0200")
Message-ID: <ldvh9n3u9a5.fsf@sarnath.mit.edu>
MIME-Version: 1.0
Cc: kerberos@mit.edu
Content-Type: text/plain; charset="utf-8"
Errors-To: kerberos-bounces@mit.edu
Content-Transfer-Encoding: 8bit

Mark Pröhl <mark@mproehl.net> writes:

> according to http://web.mit.edu/kerberos/krb5-1.13/doc/admin/lockout.html, the account lockout state is represented by the three account properties "The time of last successful authentication", "The time of last failed authentication" and "A counter of failed attempts". And that account lockout state should not be replicated. 

[...]

> However, in my simple test environment (Debian Jessie, MIT Kerberos 1.12.1) after a kprop/kpropd based full replication, all three properties seem to be replicated.

As implemented, "non-replicated" means not replicated by iprop.  I
believe this was the intent.  Full dumps include the non-replicated
lockout state attributes, probably to simplify promoting a slave to a
master.  Currently, the only way to prevent kdb5_util dump from dumping
the lockout state attributes is by using a command line flag that is for
the internal use of iprop.

This seems like it could be either a documentation bug, or a design
flaw, depending on your point of view.  Is it helpful to have an option
to suppress the lockout state attributes from full dumps?  If so, why?

Thanks.

-Tom

________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos


home help back first fref pref prev next nref lref last post