Info regarding MIT 1.8 Crypto modularity feature.

Jeffrey Altman jaltman at secure-endpoints.com
Mon Aug 16 10:25:46 EDT 2010


On 8/16/2010 9:48 AM, Zhanna Tsitkova wrote:
> The selection of the crypto backend happens during the configure/build  
> time.
> For example, to use openssl cryptography one needs to configure MIT  
> Kerberos with option --with-crypto-impl=openssl. If this option is  
> omitted,  the default crypto. i.e. builtin, will be used.
> Only one crypto implementation per  Kerberos crypto library is  
> supported. This means that client/server does not have an option to  
> specify the type of the desired crypto implementation during run-time.  
> That said, it would be interesting to learn about the use case when  
> one needs to have an option to switch between crypto implementations  
> at run-time.
> Thanks,
> Zhanna


The most common use cases would be:

 * FIPS 140.2 vs non-FIPS modes.  In general non-FIPS will be faster
   but for some situations a FIPS mode is required.

 * Shipping a binary that can support hardware and non-hardware
   implemented encryption.

 * End user performance testing.


Jeffrey Altman





More information about the krbdev mailing list