[30152] in Kerberos

home help back first fref pref prev next nref lref last post

Re: Creating an MIT style keytab for an existing Windows AD member

daemon@ATHENA.MIT.EDU (Nicolas Williams)
Wed Jul 23 21:42:06 2008

Date: Wed, 23 Jul 2008 20:40:46 -0500
From: Nicolas Williams <Nicolas.Williams@sun.com>
To: Russ Allbery <rra@stanford.edu>
Message-ID: <20080724014045.GJ25547@Sun.COM>
Mail-Followup-To: Russ Allbery <rra@stanford.edu>, kerberos@mit.edu
Mime-Version: 1.0
Content-Disposition: inline
In-Reply-To: <87wsjcf6dj.fsf@windlord.stanford.edu>
Cc: kerberos@mit.edu
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: kerberos-bounces@mit.edu

On Wed, Jul 23, 2008 at 05:55:20PM -0700, Russ Allbery wrote:
> Nicolas Williams <Nicolas.Williams@sun.com> writes:
> > On Wed, Jul 23, 2008 at 02:01:43PM -0400, Michael B Allen wrote:
> 
> >> Extracting the keys from AD is not possible [1].
> 
> > Nor ist it possible to extract them from MIT krb5 KDCs.
> 
> It is as of 1.6 using kadmin.local (not that this changes the rest of your
> point).

Right, it doesn't -- running kadmin.local on the KDC with sufficient
privilege qualifies as "privileged access to a KDC" :)
________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

home help back first fref pref prev next nref lref last post