[16398] in Kerberos_V5_Development

home help back first fref pref prev next nref lref last post

Re: random to key from password

daemon@ATHENA.MIT.EDU (Sam Hartman)
Mon Sep 27 17:36:37 2010

From: Sam Hartman <hartmans@mit.edu>
To: Russ Allbery <rra@stanford.edu>
Date: Mon, 27 Sep 2010 17:36:25 -0400
In-Reply-To: <87k4m6swqr.fsf@windlord.stanford.edu> (Russ Allbery's message of
	"Mon, 27 Sep 2010 14:27:24 -0700")
Message-ID: <tsl1v8evpgm.fsf@live.suchdamage.org>
MIME-Version: 1.0
Cc: lha@h5l.org, krbdev@mit.edu,
   Nicolas Williams <nicolas.williams@oracle.com>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: krbdev-bounces@mit.edu

Does anyone actually want MIT's behavior of conflating requires_preauth
behavior for servers and clients or should we split those out into
separate flags?

So, even now I'm not convinced that implementing random_to_key in terms
of random_pass would be bad.
I do think it is more complicated than I at first thought, but the
benefits may justify it.

--Sam
_______________________________________________
krbdev mailing list             krbdev@mit.edu
https://mailman.mit.edu/mailman/listinfo/krbdev

home help back first fref pref prev next nref lref last post