[krbdev.mit.edu #7887] kadmin reports 'no salt' for normally-salted entries using key_data_ver=1
The RT System itself via RT
rt-comment at krbdev.mit.edu
Fri Mar 21 14:50:00 EDT 2014
>From krb5-bugs-incoming-bounces at PCH.mit.edu Fri Mar 21 14:49:59 2014
Return-Path: <krb5-bugs-incoming-bounces at PCH.mit.edu>
Received: from pch.mit.edu (PCH.MIT.EDU [18.7.21.90])
by krbdev.mit.edu (Postfix) with ESMTP id AA72C751B3;
Fri, 21 Mar 2014 14:49:59 -0400 (EDT)
Received: from pch.mit.edu (pch.mit.edu [127.0.0.1])
by pch.mit.edu (8.13.6/8.12.8) with ESMTP id s2LInxRB016247;
Fri, 21 Mar 2014 14:49:59 -0400
Received: from mailhub-dmz-4.mit.edu (mailhub-dmz-4.mit.edu [18.7.62.38])
by pch.mit.edu (8.13.6/8.12.8) with ESMTP id s2LDfIOK002664
for <krb5-bugs-incoming at PCH.mit.edu>; Fri, 21 Mar 2014 09:41:18 -0400
Received: from dmz-mailsec-scanner-6.mit.edu (dmz-mailsec-scanner-6.mit.edu
[18.7.68.35])
by mailhub-dmz-4.mit.edu (8.13.8/8.9.2) with ESMTP id s2LDcJqa029573
for <krb5-bugs at mit.edu>; Fri, 21 Mar 2014 09:41:17 -0400
X-AuditID: 12074423-f79476d000000c51-76-532c417c929a
Authentication-Results: symauth.service.identifier
Received: from mail-ie0-f176.google.com (mail-ie0-f176.google.com
[209.85.223.176]) (using TLS with cipher RC4-SHA (128/128 bits))
(Client did not present a certificate)
by dmz-mailsec-scanner-6.mit.edu (Symantec Messaging Gateway) with SMTP
id 2F.8B.03153.D714C235; Fri, 21 Mar 2014 09:41:17 -0400 (EDT)
Received: by mail-ie0-f176.google.com with SMTP id rd18so2404347iec.21
for <krb5-bugs at mit.edu>; Fri, 21 Mar 2014 06:41:16 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=1e100.net; s=20130820;
h=x-gm-message-state:mime-version:date:message-id:subject:from:to
:content-type;
bh=oUqGVe02OXlI6QwWHBCsLG3X+yq5//+MLZpTWbFRdXg=;
b=HmVhPv9MAG5cXAjr1EeFvy9Lx7KOteW2jEj3vZqa05gN4hfCpaCpq1VtaipeUbAYOd
8BZE6ZydZCkY36fcw8ZW4YJp+pBZo0KdqdKmamEuI2MBUQbH/26Ww+2nur3zxp0iWtXQ
S2nrp9ZPynl6QroQoaY0HN9il5KayZn0ztK1wMzzSoZihohcQM4ULlPzOjEPx5yR8Juu
azltxCb5mHyhwGE9oAlIrfgNFYjLv1uLdrGxNtzJRxYFFgQkBMSt7fp5h8G2hReMmxrw
WyjaVuPA0zEZcvQthhOyfJ5AgF7YWXRGw4OSnWkc7KfiTJ63CVzFRtIyBjYN8Vk59Quk
Ntpw==
X-Gm-Message-State: ALoCoQlUsSaOQb1k35QXwkx7zwJ3bQcojg1uxRHXkBx2lJEy0ISziJEcl5oo3OUGquU2HPLEjlM8
MIME-Version: 1.0
X-Received: by 10.42.53.10 with SMTP id l10mr39555259icg.33.1395409276688;
Fri, 21 Mar 2014 06:41:16 -0700 (PDT)
Received: by 10.64.60.197 with HTTP; Fri, 21 Mar 2014 06:41:16 -0700 (PDT)
Date: Fri, 21 Mar 2014 13:41:16 +0000
Message-ID: <CAEo=OUkNfVmzVa8Xz40wBqNKfKAbipCyj6PFZydmLrBqs4Bxyw at mail.gmail.com>
Subject: kadmin: Reports 'no salt' whenever key data is stored with
key_data_ver = 1
From: Nick Moriarty <nick.moriarty at york.ac.uk>
To: krb5-bugs at mit.edu
Content-Type: text/plain; charset=ISO-8859-1
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFprEKsWRWlGSWpSXmKPExsVyMfT+Bt1aR51gg80/BS0aHh5nd2D0aDpz
lDmAMYrLJiU1J7MstUjfLoErY/K/DqaCE5wVtzbcZ25g3MDexcjJISFgIvGmeyobiM0oYCSx
+9wrVoi4mMSFe+uB4lwcQgLbmCQOv7/CAuH0MUrMeLeaFcSREJjJKtF7bA4LREuCxMqPq8Bs
XgFBiZMznwDZHEDxIon5mx1BwkICXhJHpt5mArFZBFQlDsyayARRHiCx+HIPI4gtLBAmcfRw
H1icTUBP4veJeWAjRQREJV7+PQZmMwvoSLzre8A8gVFgFpJts5CkFjAyrWKUTcmt0s1NzMwp
Tk3WLU5OzMtLLdI108vNLNFLTSndxAgMPiF2F+UdjH8OKh1iFOBgVOLhreDUDhZiTSwrrsw9
xCjJwaQkyrvGWCdYiC8pP6UyI7E4I76oNCe1+BCjBAezkghvpx1QjjclsbIqtSgfJiXNwaIk
zivPATRJID2xJDU7NbUgtQgmy8TBfohRhoNDSYL3mQNQt2BRanpqRVpmTgmyGk4QwQWyhgdo
TSFIIW9xQWJucWY6RNEpRmOOprurG5k4Tq3b0MgkxJKXn5cqJc47A6RUAKQ0ozQPbiQsqVxi
lJUS5mVkYGAQ4gG6CRgUqPKvGMWBwSDMawUyhSczrwRu3yugU5iATuGfqgVySkkiQkqqgVGe
f/cK2Wq5K39nn1R7cyd9pfEblyk2Ku9E4j307gq2eYpv844MMmIqvsrL9OlGbmSxmMXHb8Kd
WcWKcj9D9/9/1rdB7ty0qtyn34+YqLc0uMyR4SwUc8yxb5sSwH7gyZzpB16bsrGUHv2e5sec
yV5jX/hueyrfKlbz0HN6pX+9u3J2thpXKLEUZyQaajEXFScCAEMLE88lAwAA
X-Mailman-Approved-At: Fri, 21 Mar 2014 14:49:58 -0400
X-BeenThere: krb5-bugs-incoming at mailman.mit.edu
X-Mailman-Version: 2.1.6
Precedence: list
Sender: krb5-bugs-incoming-bounces at PCH.mit.edu
Errors-To: krb5-bugs-incoming-bounces at PCH.mit.edu
>Originator: Nick Moriarty
>Organization: University of York
>Confidential: no
>Synopsis: kadmin reports 'no salt' for normally-salted entries using key_data_ver=1
>Severity: non-critical
>Priority: low
>Release: 1.12.1
>Environment:
System: Ubuntu GNU/Linux 3.2.0-60
Machine: x86_64
>Description:
We've found a text bug in kadmin.c, which causes keys to be
reported as unsalted whenever they have key_data_ver = 1. According
to API docs (http://cryptnet.net/mirrors/docs/krb5adm_api.html),
key_data_ver set to 1 indicates that either of the following are true:
- The key is salted using the normal v5 salting method, or
- The key was generated randomly, so salting is never applied / irrelevant
In src/kadmin/cli/kadmin.c:
1456: printf(_("no salt\n"));
This text should be changed to something more appropriate;
'normal' would seem sensible, as this is typically how normal v5
salting is identified.
>How-To-Repeat:
Run kadmin and get_princ a principal with only normal salting
on their keys; they will show up as 'no salt'.
>Fix:
1507c1507
< printf(_("no salt\n"));
---
> printf(_("normal\n"));
More information about the krb5-bugs
mailing list