[16344] in Kerberos_V5_Development

home help back first fref pref prev next nref lref last post

Re: Removing old keys

daemon@ATHENA.MIT.EDU (Russ Allbery)
Mon Sep 20 15:47:21 2010

From: Russ Allbery <rra@stanford.edu>
To: Jonathan Reams <jr3074@columbia.edu>
In-Reply-To: <02BD6B97-CF3C-4693-BE07-D703B9DC3C05@columbia.edu> (Jonathan
	Reams's message of "Mon, 20 Sep 2010 15:31:55 -0400")
Date: Mon, 20 Sep 2010 12:47:17 -0700
Message-ID: <87mxrci4e2.fsf@windlord.stanford.edu>
MIME-Version: 1.0
Cc: krbdev@mit.edu
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: krbdev-bounces@mit.edu

Jonathan Reams <jr3074@columbia.edu> writes:

> We're re-keying our principals during our migration to krb5-1.8.3 to
> take advantage of newer encryption types, and to reduce visibility to
> the end user, we're using the keepold flag when updating service
> principals. The problem is that there doesn't appear to be away to prune
> out the old keys after they expire (the time the password change
> occurred plus the maximum renewable lifetime of the principal).

Yup, that's correct.

> Is there a mechanism for pruning old keys in the same way that kdb5_util
> lets you purge old master keys that are no longer being used?

Unfortunately, no.  You have to do something ugly like dump the database,
edit the dump, and reload the database.

-- 
Russ Allbery (rra@stanford.edu)             <http://www.eyrie.org/~eagle/>
_______________________________________________
krbdev mailing list             krbdev@mit.edu
https://mailman.mit.edu/mailman/listinfo/krbdev

home help back first fref pref prev next nref lref last post