[16406] in Kerberos_V5_Development
Re: random to key from password
daemon@ATHENA.MIT.EDU (Nicolas Williams)
Mon Sep 27 19:19:44 2010
Date: Mon, 27 Sep 2010 18:19:14 -0500
From: Nicolas Williams <Nicolas.Williams@oracle.com>
To: Russ Allbery <rra@stanford.edu>
Message-ID: <20100927231914.GY9501@oracle.com>
MIME-Version: 1.0
Content-Disposition: inline
In-Reply-To: <87eicerdbk.fsf@windlord.stanford.edu>
Cc: lha@h5l.org, Sam Hartman <hartmans@mit.edu>, krbdev@mit.edu
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: krbdev-bounces@mit.edu
On Mon, Sep 27, 2010 at 04:12:15PM -0700, Russ Allbery wrote:
> Nicolas Williams <Nicolas.Williams@oracle.com> writes:
> > On Mon, Sep 27, 2010 at 03:49:15PM -0700, Russ Allbery wrote:
>
> >> This still doesn't work: previously created service principals then
> >> can't authenticate to any new service created after one started setting
> >> pre-auth by default.
>
> > Yes they can: their client krb5.conf says to do pre-auth.
>
> Hm, this is a krb5.conf setting with which I was not previously familiar
> and which so far as I can tell does not appear in the krb5.conf man page.
> What's the name of it?
Huh. I guess I just made up a memory. Such an option would be handy...
Nico
--
_______________________________________________
krbdev mailing list krbdev@mit.edu
https://mailman.mit.edu/mailman/listinfo/krbdev