Password has expired while getting initial ticket during replication
Stephen Carville (Kerberos List)
b44261a2 at opayq.com
Tue Dec 3 15:53:45 EST 2019
On 12/2/19 12:58 PM, Greg Hudson wrote:
> Lereta Email Checkpoint: External email. Please make sure you trust this source before clicking links or opening attachments.
>
> **********************************************************************
>
> On 12/2/19 3:23 PM, Stephen Carville (Kerberos List) wrote:
>> It seems that when I add a key to the keytab file the password
>> expiration date for that host is set to somewhen in 1903. I've never
>> noticed that behavior before and it only seems to happen to KDCs.
>
> I would guess that these principal entries have a policy object
> associated with them (as displayed in the Policy field of the getprinc
> output), and that the policy (display with "getpol <policyname>") has a
> maximum password life of 20 years, likely because whoever set it up
> didn't really want a maximum password life but didn't know how to
> disable it ("modpol -maxlife 0 <policyname>", or 'modpol -maxlife "0
> seconds" <policyname>' for releases before 1.15).
You guessed right. I had the policy -maxlife on host policy set to
+7305 days. It never occurred to me that the timestamp would be 32 bit
instead of 64 bit. It is fixed now.
Thank you again.
> When 20 years is added to the current time, the result is a timestamp
> later than the 32-bit signed overflow point in January 2038. Release
> 1.16 and later can handle timestamps past that point (up until the year
> 2106) on 64-bit platforms, but earlier releases wrap around to
> historical dates.
> ________________________________________________
> Kerberos mailing list Kerberos at mit.edu
> https://mailman.mit.edu/mailman/listinfo/kerberos
>
More information about the Kerberos
mailing list