> On Jun 20, 2015, at 11:15 AM, John Devitofranceschi <j...@optonline.net> 
> wrote:
> ...
> It seems that this can be done by kinit’ing against all the KDCs as the 
> target principal like this and checking the error message:
> 
> echo “” | kinit princ 2>&1 | grep revoke => account is locked
> 
> ...
> Once I find a (non-kadmind) kdc where the account is locked, I cannot unlock 
> it using a standard kadmin -q “modprinc -unlock princ”  The principal state 
> is not propagated via iprop.
> ...
> But I am not seeing the principal getting unlocked on the slave,…

So, after some more experimentation I have determined that things ARE working 
as intended.  It’s just that the failed password attempt count is not reset 
until the user actually tries to authenticate. 

The test I have (above) cannot tell if a principal is locked or if it has 
*just* been unlocked, since a null password is not considered a failed attempt 
and the count is not reset when that is tried.

So, everything is working as expected, I expect.

jd

Attachment: smime.p7s
Description: S/MIME cryptographic signature

________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to