Andrew,
We completed the document change regarding the key salt calculation for realm trust. The change will appear in the future release of 3.3.1 [MS-KILE] as follows. 3.3 KDC Details 3.3.1 Abstract Data Model KILE concatenates the following information to use as the key salt for realm trusts: Inbound trusts: <all upper case name of the remote realm> | "krbtgt" | <all upper case name of the local realm> Outbound trusts: <all upper case name of the local realm> | "krbtgt" | <all upper case name of the remote realm> Please let us know if you need further clarification on this subject. Thanks ---------------------------------------------------------- Hongwei Sun - Sr. Support Escalation Engineer DSC Protocol Team, Microsoft [EMAIL PROTECTED] Tel: 469-7757027 x 57027 ----------------------------------------------------------- -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Andrew Bartlett Sent: Tuesday, August 26, 2008 5:07 PM To: Richard Guthrie Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED] Subject: [cifs-protocol] RE: 600634 - RE: salt used for various principal types On Tue, 2008-08-26 at 08:37 -0700, Richard Guthrie wrote: > Andrew > > Microsoft does use different methods of calculating the salt value > used in encryption depending on the type account that is submitted to > the salt calculation implementation. For example, in the case of > interdomain trust accounts, "krbtgt" is appended. In the case of > machine accounts, "host" is appended to the start of the salt value. > > Implementers are free to implement a salt algorithm of their choice, without > affecting interoperability. This would be true, but this applies only to objects of the type normally found under cn=users. The salt to use for a password stored in trustAuthIncoming/trustAuthOutgoing must be specified in the docs. It is not possible to negotiate an alternate salt for the AES or DES keys of interdomain trusts in Kerberos. In any case, the salts as you describe should be included in a discussion of the Microsoft KDC. Andrew Bartlett -- Andrew Bartlett http://samba.org/~abartlet/ Authentication Developer, Samba Team http://samba.org Samba Developer, Red Hat Inc.
_______________________________________________ cifs-protocol mailing list cifs-protocol@cifs.org https://lists.samba.org/mailman/listinfo/cifs-protocol