[1173] in Kerberos_V5_Development

home help back first fref pref prev next nref lref last post

MD5 by default?

daemon@ATHENA.MIT.EDU (Richard Basch)
Wed May 15 01:40:11 1996

Date: Wed, 15 May 1996 01:39:30 -0400
To: tytso@MIT.EDU, krbdev@MIT.EDU
From: "Richard Basch" <basch@lehman.com>


I have the following in my /etc/krb5.conf:

[libdefaults]
        ticket_lifetime = 1440
        ccache_type = 4
        default_realm = Lehman.COM
        default_domain = LEHMAN.COM
        krb4_srvtab = /etc/kerberosIV/srvtab
        krb4_config = /etc/kerberosIV/krb.conf
        default_tkt_enctypes = des3-cbc-sha des-cbc-md5
        default_tgs_enctypes = des3-cbc-sha des-cbc-md5

and my database primarily consists of V4 keys (des-cbc-crc:v4)
On the machines for which I have created a keytab, I wanted to start
using des-cbc-md5 for the k5 sessions (even though md5 may be on its way
out, it is still better than crc).

However, when I try, I get an error saying the encryption type is not
supported.  If I change the service key (still des-cbc-crc:v4) to have
the md5 attribute (kdb5_edit -R "modent +md5 ..."), it works.

The problem is that I still have a V4 kadmin server and a V5 admin
server, both of which are creating keys without the md5 attribute.
There doesn't seem to be a clean way to change the default behavior.

Should we consider adding such a facility?  In the meantime, I am of
course editing my copies of the admin servers, and changing all my
principal keys to have it set, since I don't have a backwards
compatibility issue.


Richard Basch                   
Sr. Developer/Analyst           URL: http://web.mit.edu/basch/www/home.html
Lehman Brothers, Inc.           Email: basch@lehman.com, basch@mit.edu
101 Hudson St., 33rd Floor      Fax:   +1-201-524-5828
Jersey City, NJ 07302-3988      Voice: +1-201-524-5049


home help back first fref pref prev next nref lref last post