Key version in .NET

John Brezak jbrezak at windows.microsoft.com
Tue May 21 12:00:08 EDT 2002


In RC1 of .NET server, you will see small numbers based on the password
generation number for key version numbers of accounts. We made this
change due to a bug in other Kerberos implementations that only allowed
key version numbers < 255.

The ktpass.exe in RC1 will set the kvno in the keytab correctly.

The Beta release had key version numbers based on the last password
change time - minus the account creation time. You can see the kvno by
examining the "msDS-KeyVersionNumber" attribute on the account object.

FYI- Trusts are not key versioned in .NET server. This will be addressed
in a future version of Windows.

-----Original Message-----
From: Nicolas.Williams at ubsw.com [mailto:Nicolas.Williams at ubsw.com] 
Sent: Tuesday, May 21, 2002 6:59 AM
To: gverby at hotmail.com; kerberos at mit.edu
Subject: RE: Key version in .NET


I thought ActiveDirectory used the same kvno all the time...

Nico
--  

> -----Original Message-----
> From: Greg Verby [mailto:gverby at hotmail.com]
> Sent: Monday, May 20, 2002 10:07 PM
> To: kerberos at mit.edu
> Subject: Key version in .NET
> 
> 
> I have been trying to get kerberos to work with a Microsoft Windows
> .NET DC using DES-CBC-MD5 encryption. One of the problems I am seeing
> is that the DC is sending back a key version number that seems to be a
> random number. It does not follow any clear pattern. This confuses the
> other end as it can not find a key with a matching key version.
> Does anyone know if .NET is caring about the key version and if so how
> it is used?
> 
> Thanks,
> Greg V.
> ________________________________________________
> Kerberos mailing list           Kerberos at mit.edu
> http://mailman.mit.edu/mailman/listinfo/kerberos
> 

Visit our website at http://www.ubswarburg.com

This message contains confidential information and is intended only 
for the individual named.  If you are not the named addressee you 
should not disseminate, distribute or copy this e-mail.  Please 
notify the sender immediately by e-mail if you have received this 
e-mail by mistake and delete this e-mail from your system.

E-mail transmission cannot be guaranteed to be secure or error-free 
as information could be intercepted, corrupted, lost, destroyed, 
arrive late or incomplete, or contain viruses.  The sender therefore 
does not accept liability for any errors or omissions in the contents 
of this message which arise as a result of e-mail transmission.  If 
verification is required please request a hard-copy version.  This 
message is provided for informational purposes and should not be 
construed as a solicitation or offer to buy or sell any securities or 
related financial instruments.

________________________________________________
Kerberos mailing list           Kerberos at mit.edu
http://mailman.mit.edu/mailman/listinfo/kerberos
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/x-pkcs7-signature
Size: 10031 bytes
Desc: not available
Url : http://mailman.mit.edu/pipermail/kerberos/attachments/20020521/c6166d4c/attachment.bin


More information about the Kerberos mailing list