I am experimenting with OpenAFS 1.4 to evaluate using for my company.
We have a testing Kerberos 5 domain using AES256 encryption for all
existing users and services.  I setup an OpenAFS file and database
server with kaserver disabled and asetkey to add a des-cbc-crc service
key to KeyFile.  The server is now successfully running in our test domain.

A couple observations from what I've read about OpenAFS 1.4:

1. Currently, there is no support for anything besides DES encryption
between the Kerberos 5 servers and OpenAFS with make that that will be
weakest link in our network.

2. All OpenAFS file and/or database servers all use the same KeyFile
which means a root compromise on any single OpenAFS server equal to
compromising the entire cell.

I am not trying to bash OpenAFS, just understand the current state of
security in the production branch.


Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to