afs to k5 conversion keytypes
jhutz at cmu.edu
Tue Feb 22 16:12:34 EST 2005
On Tuesday, February 22, 2005 03:45:10 PM -0500 Ken Hornstein
<kenh at cmf.nrl.navy.mil> wrote:
>> krb5_change_password is not any worse to use than the init_creds API.
>> You can avoid the kadm5 API.
> Oh, sure ... but I'm not sure that's sufficient. What you probably
> want to do is query the database to see what enctypes your principal
> record has (so you're not doing a whole lot of password changes) and
> _that_ requires the kadm5 API. I guess you could do a password change
> for every login, but that sure would suck. Assuming you support something
> stronger than single-DES, you could get away with checking the enctype
> of the TGT session key, and you could avoid the kadm5 API that way.
I've been thinking about this recently, and I think what you want to do
(though there is no clear API for this) is check the enctype of the
long-term key that was actually used in getting the TGT.
If you believe you support AES, and the KDC supports AES, then you're going
to get an AES session key even if you don't have an AES long-term key.
OTOH, if you claimed to support AES and the long-term key the KDC actually
used was DES, then you should do the password change. Assuming, of course,
that the feature is enabled and that local configuration says you want to
have AES keys.
More information about the Kerberos