[16343] in Kerberos_V5_Development

home help back first fref pref prev next nref lref last post

Removing old keys

daemon@ATHENA.MIT.EDU (Jonathan Reams)
Mon Sep 20 15:31:59 2010

From: Jonathan Reams <jr3074@columbia.edu>
Date: Mon, 20 Sep 2010 15:31:55 -0400
Message-Id: <02BD6B97-CF3C-4693-BE07-D703B9DC3C05@columbia.edu>
To: krbdev@mit.edu
Mime-Version: 1.0 (Apple Message framework v1081)
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: krbdev-bounces@mit.edu

We're re-keying our principals during our migration to krb5-1.8.3 to take advantage of newer encryption types, and to reduce visibility to the end user, we're using the keepold flag when updating service principals. The problem is that there doesn't appear to be away to prune out the old keys after they expire (the time the password change occurred plus the maximum renewable lifetime of the principal). Is there a mechanism for pruning old keys in the same way that kdb5_util lets you purge old master keys that are no longer being used?

Jonathan Reams
Assoc. Systems Engineer
Columbia University
jreams@columbia.edu
_______________________________________________
krbdev mailing list             krbdev@mit.edu
https://mailman.mit.edu/mailman/listinfo/krbdev

home help back first fref pref prev next nref lref last post