Sam Hartman [EMAIL PROTECTED] writes:
OK. A lot of this looks like issues finding the right key for a service
key. It seems like fixing the library code there is a better fix than
including a domain_realm entry. In particular how much of r19598 would
help?
It looks like this fixes some of
Russ Allbery [EMAIL PROTECTED] writes:
It looks like this fixes some of the problems, but it still doesn't fix
the problem for ksu. Running ksu without a domain_realm setting for the
local hostname fails:
wanderer:~ ksu
WARNING: Your password may be exposed if you enter it here and are
OK. A lot of this looks like issues finding the right key for a
service key. It seems like fixing the library code there is a better
fix than including a domain_realm entry. In particular how much of
r19598 would help?
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of
Russ == Russ Allbery [EMAIL PROTECTED] writes:
Russ Package: krb5-config Version: 1.17 Severity: normal
Russ With MIT Kerberos 1.6, sometimes odd things happen if one
Russ doesn't have a domain_realm mapping for the local realm in
Russ places where things previously worked. We
Sam Hartman [EMAIL PROTECTED] writes:
Russ == Russ Allbery [EMAIL PROTECTED] writes:
Russ Package: krb5-config Version: 1.17 Severity: normal
Russ With MIT Kerberos 1.6, sometimes odd things happen if one
Russ doesn't have a domain_realm mapping for the local realm in
Russ
Package: krb5-config
Version: 1.17
Severity: normal
With MIT Kerberos 1.6, sometimes odd things happen if one doesn't have
a domain_realm mapping for the local realm in places where things
previously worked. We also don't want to rely on DNS for the realm
mapping if we can avoid it. Perhaps
6 matches
Mail list logo