[11789] in Kerberos-V5-bugs

home help back first fref pref prev next nref lref last post

Re: [krbdev.mit.edu #6821] The +preauth default in kdc.conf isn't

daemon@ATHENA.MIT.EDU (D.H.Davis@bath.ac.uk via RT)
Wed Nov 17 11:00:10 2010

Mail-followup-to: rt@krbdev.mit.edu
mail-copies-to: never
From: "D.H.Davis@bath.ac.uk via RT" <rt-comment@krbdev.MIT.EDU>
In-Reply-To: <rt-6821@krbdev.mit.edu>
Message-ID: <rt-6821-33475.15.5025792539068@krbdev.mit.edu>
To: "'AdminCc of krbdev.mit.edu Ticket #6821'":;"'AdminCc of krbdev.mit.edu Ticket #6821'":;@MIT.EDU
Date: Wed, 17 Nov 2010 11:00:08 -0500 (EST)
Reply-To: rt-comment@krbdev.MIT.EDU
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: krb5-bugs-bounces@mit.edu

On Wed, 17 Nov 2010, Greg Hudson via RT wrote:

> From: Greg Hudson via RT <rt-comment@krbdev.mit.edu>
> To: D.H.Davis@bath.ac.uk
> Date: Wed, 17 Nov 2010 15:33:13
> Subject: [krbdev.mit.edu #6821] The +preauth default in kdc.conf isn't always
>     obeyed. 
>
> Prior to 1.8, addprinc -randkey was implemented in three
> RPCs: create the principal with a dummy password and the
> disallow-all-tix flag, randomize its password, unset the
> disallow-all-tix flag.  This had the unfortunate side effect of
> ignoring the KDC's default flags.
>
> There is now a better way (create the principal with a null
> password), but clients and servers both have to be at 1.8 for it
> to work.

Thanks for the very prompt reply.

I wondered if something like this was happening when I noticed
-randkey with 1.6.3 and 1.7.1 kadmin produced principals with a Key
vno of 2, whereas -randkey with a 1.8.x kadmin produced principals
with a Key vno of 1.

I note you're using RT so please flag this ticket as closed, if
you haven't done so already.  It would be unreasonable to expect
the improved interface to be back-ported to earlier versions of
kerberos.

(This arose because I've recently switched to using the +preauth
 default for all principals associated with humanoids.  Easily
 done by making it the default in kdc.conf.  Typically I, and I
 suspect others, use -randkey when generating host and service based
 principals.  So I was expecting to have to turn off preauth on such
 principals as I'm not quite ready to go there yet.  I was puzzled
 when I didn't have to turn off +preauth with a production KDC
 running 1.6.3.  It had already been done for me!)
-- 
Dennis Davis, BUCS, University of Bath, Bath, BA2 7AY, UK
D.H.Davis@bath.ac.uk               Phone: +44 1225 386101

_______________________________________________
krb5-bugs mailing list
krb5-bugs@mit.edu
https://mailman.mit.edu/mailman/listinfo/krb5-bugs

home help back first fref pref prev next nref lref last post