[39300] in Kerberos

home help back first fref pref prev next nref lref last post

Re: Removing deprecated keys

daemon@ATHENA.MIT.EDU (Greg Hudson)
Wed Nov 1 02:15:36 2023

Message-ID: <a6438895-e809-4685-9130-f8f3c4952bd7@mit.edu>
Date: Wed, 1 Nov 2023 02:13:54 -0400
MIME-Version: 1.0
Content-Language: en-US
To: "Dan Mahoney (Gushi)" <danm@prime.gushi.org>, <kerberos@mit.edu>
From: "Greg Hudson" <ghudson@mit.edu>
In-Reply-To: <7e384a59-8a34-3305-f46f-30ea18942b5d@prime.gushi.org>
Content-Type: text/plain; charset="utf-8"; Format="flowed"
Errors-To: kerberos-bounces@mit.edu
Content-Transfer-Encoding: 8bit

On 10/31/23 21:16, Dan Mahoney (Gushi) wrote:
> We've recently gone through all the hard work of switching off 3des on 
> our kdcs and rolling all the things, but one of the things we note is 
> that some of our users still have the keys with the old enctypes 
> present.  Is there a way to delete just those deprecated keys, without 
> forcing a password change?

I don't believe we have that feature currently; the closest we have is 
the kadmin purgekeys command, but that command (and its associated 
libkadm5 RPC) only removes whole key versions.

It would be possible to write a C program using libkdb5 to crawl the 
database and remove the desired keys; I can't think of any simpler 
approach.  I believe common practice is just to force password changes, 
or wait until password maximum lifetimes force changes over time.

If you're at the point of not relying on any des3-cbc-sha1 keys, you can 
set a permitted_enctypes in [libdefaults] on the KDC that does not 
include it (a value of "DEFAULT -des3" should work).  Then the KDC will 
ignore those keys while continuing to allow the other ones to be used.
________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos


home help back first fref pref prev next nref lref last post