[32336] in Kerberos

home help back first fref pref prev next nref lref last post

Re: problem with pam_krb5 4.2-1

daemon@ATHENA.MIT.EDU (Russ Allbery)
Fri May 14 12:32:07 2010

From: Russ Allbery <rra@stanford.edu>
To: Rohit Kumar Mehta <rohitm@engr.uconn.edu>
In-Reply-To: <4BED54D9.6010400@engr.uconn.edu> (Rohit Kumar Mehta's message of
	"Fri, 14 May 2010 09:49:13 -0400")
Date: Fri, 14 May 2010 09:31:52 -0700
Message-ID: <87pr0yh2br.fsf@windlord.stanford.edu>
MIME-Version: 1.0
Cc: kerberos@mit.edu
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: kerberos-bounces@mit.edu

Rohit Kumar Mehta <rohitm@engr.uconn.edu> writes:

> Thanks for your help Russ.  My keys are indeed only plain DES keys, but
> I also have allow_weak_crypto set to true.  (We're using Kerberized NFS
> in Linux which I think at this point requires weak crypto)

Is allow_weak_crypto also set on the KDCs involved?

> So I guess I will have to generate new keytabs and recreate the trust,
> and that problem should go away?

You should not need to do any of that if allow_weak_crypto is set.

-- 
Russ Allbery (rra@stanford.edu)             <http://www.eyrie.org/~eagle/>
________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

home help back first fref pref prev next nref lref last post