Re: Concealing keys (not even in NSS)

2016-09-20 Thread Michael Ströder
Greg Hudson wrote: > Is it sufficient for just the master key to be behind a PKCS #11 device, so > that the existing database format can be preserved at the cost of letting > long-term keys pass through KDC application memory? IMO yes. Ciao, Michael. smime.p7s Description: S/MIME Cryptographi

Re: Concealing keys (not even in NSS)

2016-09-20 Thread Rick van Rein
Hi Greg, You're as thorough as always :) > * Ephemeral keys (ticket session keys, initiator and acceptor subkeys) > are generated randomly by one party and sent to the other inside an > encrypted message. Do we extend the protocol so that these keys can be > wrapped in parent keys within the encr

new msktutil release v1.0

2016-09-20 Thread Mark Pröhl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi all, we are pleased to announce version 1.0 of msktutil. Msktutil is a program for interoperability with Active Directory. It creates user or computer accounts in Active Directory, creates Kerberos keytabs on Unix/Linux systems, adds and removes

Using enterprise principal name in GSS-API

2016-09-20 Thread Isaac Boukris
Hi all, Is there a way to support name canonicalization (like kinit -E) when acquiring creds via gss_acquire_cred_with_password() and gss_acquire_cred_impersonate_name() ? The use case is to use userPrincipalName for client name against AD. Thanks! ___

Re: KEYRING:persistent and ssh

2016-09-20 Thread tseegerkrb
Thanks for your help. Is my setup so special (kerberos/OpenLDAP/sssd/sshd) nobody using it? I think i will ask debian/ubuntu or the openssh maintainer for help. On 19.09.2016 18:23, Russ Allbery wrote: > tseegerkrb writes: > >> I think the sshd daemon do not honor the "default_ccache_name" and