[19169] in Kerberos

home help back first fref pref prev next nref lref last post

Re: Improved support for password/principal expiration

daemon@ATHENA.MIT.EDU (James F.Hranicky)
Fri May 2 10:30:34 2003

Date: Fri, 2 May 2003 10:29:44 -0400
From: "James F.Hranicky" <jfh@cise.ufl.edu>
To: Raymond M Schneider <ray@securityfoo.net>
Message-Id: <20030502102944.6652506a.jfh@cise.ufl.edu>
In-Reply-To: <20030502140232.GA4502@securityfoo.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
cc: kerberos@mit.edu
Errors-To: kerberos-bounces@mit.edu

On Fri, 2 May 2003 10:02:32 -0400
Raymond M Schneider <ray@securityfoo.net> wrote:

> I seem to recall someone telling me that even though passwd expiration
> notification was broken in the 1.2.* codebase, that it had been fixed
> in the 1.3.* code base? still true? 

AFAICT, the bug that prevents notification on the client side has been fixed,
but there's still only one field "key_exp" in struct _krb5_enc_kdc_rep_part
that allows for an expiration date. 

do_as_req.c still shows only 

	reply_encpart.key_exp = client.expiration;

and there's no code setting any field in reply_encpart to the value of
client.pw_expiration . 

Jim
________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

home help back first fref pref prev next nref lref last post