On Thu, 2008-09-04 at 13:37 +0200, Mark Phalan wrote:
> On Wed, 2008-09-03 at 19:11 -0700, Henry B. Hotz wrote:
> > 1) the AFS salt is only relevant for the AS_REQ and not for the TGS_REQ.
> > 
> > 2) anyone supporting AFS salt in a K5 kdc is almost certainly also  
> > supporting the standard salt as well.  As noted a simple password  
> > change then eliminates the problem since a K5 kinit will only see the  
> > standard salt, and the AFS salt will only be used by kaserver  
> > emulation code (which Sun doesn't have).
> > 
> > 3) all recent OpenAFS (and Arla) implementations have been able to  
> > handle K5 formatted AFS tokens.  For some discussion of ways to get  
> > AFS tokens in a K5 infrastructure take a look at 
> > http://www.eyrie.org/~eagle/software/pam-afs-session/ 
> > .
> > 
> > 4) OpenAFS strongly recommends that you use a standard Kerb5 server  
> > and not the kaserver for new deployments.
> > 
> > I'm not really keeping up with AFS, and I haven't tried to build aklog  
> > on S10 recently, but I seriously doubt there is anything to prevent  
> > someone from doing a new OpenAFS deployment using a Sun Kerberos  
> > infrastructure.  If aklog won't build, I know they would welcome  
> > patches to make it build, and I doubt it would be difficult.  (Have  
> > you done this lately, Doug?)
> > 
> > My recommendations:
> > 
> > 1) support the AFS salt *properly* for client initial  
> > authentications.  (The current S9/S10 and MIT code does not behave  
> > correctly if a >8 character AFS password is used.)  I know this may be  
> > difficult to test, so if you don't then please at least do something  
> > more user-friendly than a seg-fault!
> 
> Can you elaborate more on the seg-fault? I fixed this in S10u5 and
> Nevada which sounds related:
> 
> 6644742 kadmind cores when using an 'afs3' salt and password > 8 chars
> 
> you can see (a very little bit) more at bugs.opensolaris.org.

Well actually you can't - it doesn't seem to be there.

-M


Reply via email to