[2473] in Kerberos_V5_Development

home help back first fref pref prev next nref lref last post

Re: Password expiration via a preauth mechanism

daemon@ATHENA.MIT.EDU (Theodore Y. Ts'o)
Thu Jul 31 13:04:25 1997

Date: Thu, 31 Jul 1997 13:01:56 -0400
From: "Theodore Y. Ts'o" <tytso@MIT.EDU>
To: Ken Hornstein <kenh@cmf.nrl.navy.mil>
Cc: "Theodore Y. Ts'o" <tytso@MIT.EDU>, krbdev@MIT.EDU
In-Reply-To: Ken Hornstein's message of Wed, 30 Jul 1997 15:09:53 -0400,
	<199707301909.PAA27749@ginger.cmf.nrl.navy.mil>

   Date: Wed, 30 Jul 1997 15:09:53 -0400
   From: Ken Hornstein <kenh@cmf.nrl.navy.mil>

   >Actually, if I remember correctly there's partial support for last-req
   >in the KDC, although it's for certain that we're not currently using it.

   What I see is:

   static krb5_last_req_entry nolrentry = { KV5M_LAST_REQ_ENTRY, KRB5_LRQ_NONE, 0 }
   ;
   static krb5_last_req_entry *nolrarray[] = { &nolrentry, 0 };

   krb5_error_code
   fetch_last_req_info(dbentry, lrentry)
   krb5_db_entry *dbentry;
   krb5_last_req_entry ***lrentry;
   {
       *lrentry = nolrarray;
       return 0;
   }

   It was easier for me to build on the preauth framework, since it already
   existed and was known to work.

Yes, but all of the ASN.1 marshalling and unmarshalling is already in
place.  It's simply a matter of filling in the linked list of last_req
entries in the KDC.

						- Ted

home help back first fref pref prev next nref lref last post