Yes, the bug was filed to fix MIT's kadmind to accept RPCSEC_GSS change 
password.  However, there are more fixes required in MIT's code base 
that need to be made to ensure that temporary or lingering ccaches can 
not be used to commandeer new changepw service tickets.  This would 
involved changes to their kdb5_util to create the associated service 
principal correctly.

In the mean time you can resolve this issue by setting kpasswd_protocol 
to SET_CHANGE in your s10's krb5.conf(4) file.  This will allow you to 
change passwords using the older Horowitz protocol.

I will submit another patch shortly to MIT for the kdb5_util changes for 
this.

Thanks,

Shawn.
--
Kurt Adam wrote:
> *sigh*  Stupid clipboard tricks. >.<
>
> _This_ is the bug in question 
> http://mailman.mit.edu/pipermail/krb5-bugs/2005-May/003835.html
>  
>  
> This message posted from opensolaris.org
> _______________________________________________
> security-discuss mailing list
> security-discuss at opensolaris.org
>
>   


-- 
Shawn.


Reply via email to