[krbdev.mit.edu #3699] [PATCH] add support to kadm5 for removing old kvnos
Ken Raeburn via RT
rt-comment at krbdev.mit.edu
Wed Jun 14 21:33:58 EDT 2006
I'd make some changes in the docs before incorporating this -- in
particular, I think you *do* want to use -keepold and flushkeys for
non-TGS principals, so as not to disrupt service for users to whom
credentials have recently been issued.
I wonder if there's a better way to automate this for the administrator
-- say, adding information in the database saying when the old key
expires, and automatically purging expired keys (which we might want to
build into the back end?), and when changing the key with -keepold,
automatically setting that value to now+maxlife. (Unless another magic
flag is given meaning "I haven't yet distributed this key to all the
servers in the load-sharing cluster/AFS cell/whatever, so don't use it
yet and don't compute the expiration date for the old one yet". For
that matter, something to check: Do our current tools store the key in
the keytab before the KDC would be able to use the new key, or is there
a race condition in that part of the process?) But that can be added
later, and then this protocol option can sit around unused...
We should add a test case for this, as well, preferably when or before
integrating.
More information about the krb5-bugs
mailing list