On Jul 17, 2009, at 15:01 , Eric Chris Garrison wrote:
[r...@rufus2 etc]# klist -e Ticket cache: FILE:/tmp/krb5cc_0 Default principal: afs/[email protected]Valid starting Expires Service principal 07/17/09 14:34:44 07/18/09 00:34:44 krbtgt/[email protected] renew until 07/18/09 14:34:44, Etype (skey, tkt): AES-256 CTS mode with 96-bit SHA-1 HMAC, AES-256 CTS mode with 96-bit SHA-1 HMAC
Er? AES-256 won't work with AFS.
07/17/09 14:38:58 07/18/09 00:38:55 afs/[email protected] renew until 07/18/09 14:38:51, Etype (skey, tkt): DES cbc mode with CRC-32, DES cbc mode with RSA-MD5
This is what it should look like. -- brandon s. allbery [solaris,freebsd,perl,pugs,haskell] [email protected] system administrator [openafs,heimdal,too many hats] [email protected] electrical and computer engineering, carnegie mellon university KF8NH
PGP.sig
Description: This is a digitally signed message part
