[Kdc-info] prelim draft of kdc information model

Nicolas Williams Nicolas.Williams at sun.com
Mon Jul 21 13:18:42 EDT 2003


On Mon, Jul 21, 2003 at 01:09:23PM -0400, Sam Hartman wrote:
>     Ken> I don't see any point in perpetuating the overloading we do
>     Ken> in the MIT database where the set of service key enctypes
>     Ken> also describes the encryption types supported by the
>     Ken> application server software.  

SAM> I think there are too many enctype related options, not too
SAM> few.  If you want to separate enctypes a service supports from
SAM> keys that a service has, I think that you should justify the
SAM> additional complexity/options.

SAM> I agree that there is no need for both the supported enctypes
SAM> and keyed enctypes to be the same.  However I don't see any
SAM> harm in doing things this way and it is one less thing to
SAM> configure or get out of sync.

The complexity is in the password/key change protocol and we'll need
this for extensions anyways, which I think amply justifies the
additional complexity.

Besides, the number of UI options visible to users and/or admins
need not go up.  When changing a service principal's keys the
admin could be given the option of listing the enctypes that the
principal accepts in order of preference and the principal should
magically end up with a single key of the first enctype in that
list.  This list of acceptable enctypes need not be provided
every time that the service principal's keys change either.

Cheers,

Nico
-- 


More information about the kdc-info mailing list