[12097] in Kerberos-V5-bugs
[krbdev.mit.edu #6964] SVN Commit
daemon@ATHENA.MIT.EDU (Greg Hudson via RT)
Thu Sep 22 14:09:49 2011
Mail-followup-to: rt@krbdev.mit.edu
mail-copies-to: never
From: "Greg Hudson via RT" <rt-comment@krbdev.MIT.EDU>
In-Reply-To: <rt-6964@krbdev.mit.edu>
Message-ID: <rt-6964-34290.15.1317473834595@krbdev.mit.edu>
To: "'AdminCc of krbdev.mit.edu Ticket #6964'":;"'AdminCc of krbdev.mit.edu Ticket #6964'":;@MIT.EDU
Date: Thu, 22 Sep 2011 14:09:46 -0400 (EDT)
Reply-To: rt-comment@krbdev.MIT.EDU
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: krb5-bugs-bounces@mit.edu
This change allows the "special" salt type to be used in
supported_enctypes or in the argument to kadmin's cpw -e. If used,
kadmind will pick a salt consisting of 64 random bits represented as
16 printable ASCII characters. The use of random explicit salts
creates some interoperability issues and is not generally recommended,
but can be useful for interop testing, as a workaround for obscure
bugs, or to increase the difficulty of brute-force password searches
in situations where none of the interoperability issues apply.
http://src.mit.edu/fisheye/changelog/krb5/?cs=25226
Commit By: ghudson
Revision: 25226
Changed Files:
U trunk/src/lib/kdb/kdb_cpw.c
_______________________________________________
krb5-bugs mailing list
krb5-bugs@mit.edu
https://mailman.mit.edu/mailman/listinfo/krb5-bugs