[19131] in Kerberos

home help back first fref pref prev next nref lref last post

Re: key salting and kerberos v5

daemon@ATHENA.MIT.EDU (Sam Hartman)
Sun Apr 27 19:55:42 2003

To: cryos98@yahoo.com (Calimer0)
From: Sam Hartman <hartmans@MIT.EDU>
Date: Sun, 27 Apr 2003 19:54:59 -0400
In-Reply-To: <3e217f40.0304271539.c448335@posting.google.com>
	(cryos98@yahoo.com's message of "27 Apr 2003 16:39:00 -0700")
Message-ID: <tslk7dfjy24.fsf@konishi-polis.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
cc: kerberos@mit.edu
Errors-To: kerberos-bounces@mit.edu

>>>>> "Calimer0" == Calimer0  <cryos98@yahoo.com> writes:

    Calimer0> from kerberos FAQ 2.0:
    >> In Kerberos 5 the complete principal name (including the realm)
    >> is used as the salt

    Calimer0> but listing principals properties with kadmin what I see
    Calimer0> is:

    Calimer0> [...]  Key: vno 1, triple DES cbc mode with HMAC/sha1,
    Calimer0> no salt Key: vno 1, DES cbc mode with CRC-32, no salt
    Calimer0> [...]

    Calimer0> I thought that key salting was the default behaviour,

It is.  Kadmin should really say default salt not no salt.  That's
what it actually means.

It says no salt because there is no salt tuple associated with the key
entry.  When no such tuple exists, then the default salt is used.

________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

home help back first fref pref prev next nref lref last post