Dr A V Le Blanc wrote:
> 
> On Tue, Jun 06, 2000 at 10:27:44PM -0500, Douglas E. Engert wrote:
> > True, but the point was to use K5 authentication, and AFS could continue to do
> > what ever it wants for its protocol. The point you make are improvments to
> > the protocol, which could occur at a later time.
> ...
> > The above are also improvments to the AFS protocol, which don't need
> > to be made to get the authenticaiton to use K5. It will still limit
> > it to a 56 bit DES key.
> 
> I don't know whether I have misunderstood, but you might have a look
> at the KTH kerberos 5 server, heimdal.  It is able to
> 
> (1)  Import AFS kerberos databases from a Transarc kaserver, giving
>      (as I understand it) kerberos 5 authentication using existing
>      passwords.
> 
> (2)  Serve standard AFS kaserver requests, so that it can replace a
>      Transarc kaserver.
> 
> This means, if I understand correctly, that your AFS cell could
> interoperate with a K5 server without needing changes to the current
> Transarc binaries.  The heimdal server needs to be compiled with
> the options '--enable-kaserver --enable-kaserver-db' and linked
> with the KTH kerberos 4 libraries, and you need some special options
> in the kdc.conf file.
> 

What that sounds like is it interoperates with a server which understands
K5 and K4. The MIT server can do this, but the DCE and W2K servers can't. 
They don't have K4 support. 

Point (1) above sounds like a migration tool, and point (2) is a relacement
for the kaserver.  

Both of these sound like great ideas, but it is still using K4. 

K5 will give you better lifetimes, and forwardable tickets among other things.




>      -- Owen
>      [EMAIL PROTECTED]

-- 

 Douglas E. Engert  <[EMAIL PROTECTED]>
 Argonne National Laboratory
 9700 South Cass Avenue
 Argonne, Illinois  60439 
 (630) 252-5444

Reply via email to