On 08-01-2014 18:49, Jeffrey Altman wrote:
On 1/8/2014 1:11 PM, Jose Manuel dos Santos Calhariz wrote:
I have a cell of OpenAFS and a kerberos5 realm for tests.  I have done
the re-keying
of afs/celname@REALMNAME as explained in

http://openafs.org/pages/security/install-rxkad-k5-1.6.txt
http://openafs.org/pages/security/how-to-rekey.txt

But I have made some mistake somewhere, because when I test with
unpatched clients
1.4.x they still authenticate.
The only situation in which older clients would not authenticate are:

  1. the Kerberos v5 KDC is configured to not issue DES session keys.
     The session key is different from the long term AFS service key
     that you replaced.

I commented the line "allow_weak_crypto = true" in
/etc/krb5kdc/kdc.conf.  Now the unpatched client don't work, as I
expected.



  2. the client Kerberos contains a bug that results in the client
     core dumping if an service key enctype is used that is not
     recognized by the client.  Such a client would need to be really
     really old.




_______________________________________________
OpenAFS-info mailing list
[email protected]
https://lists.openafs.org/mailman/listinfo/openafs-info

Reply via email to