Re: krb5 transition: upgrading to krb5 1.6.1

2007-04-29 Thread Sam Hartman
> "Marcus" == Marcus Better <[EMAIL PROTECTED]> writes: Marcus> Russ Allbery wrote: >> Correct. In general, you never want to have Kerberos keys in >> your KDC for a service principal for enctypes that that service >> doesn't support. Marcus> Is there an easy way to find

Re: krb5 transition: upgrading to krb5 1.6.1

2007-04-29 Thread Russ Allbery
Marcus Better <[EMAIL PROTECTED]> writes: > Russ Allbery wrote: >> Correct. In general, you never want to have Kerberos keys in your KDC >> for a service principal for enctypes that that service doesn't support. > Is there an easy way to find out which enctypes a service supports? (And > why doe

Re: krb5 transition: upgrading to krb5 1.6.1

2007-04-29 Thread Marcus Better
Russ Allbery wrote: > Correct. In general, you never want to have Kerberos keys in your KDC for > a service principal for enctypes that that service doesn't support. Is there an easy way to find out which enctypes a service supports? (And why does the poor admin have to worry about this at all?)

Re: krb5 transition: upgrading to krb5 1.6.1

2007-04-29 Thread Russ Allbery
Steinar H Gunderson <[EMAIL PROTECTED]> writes: > Reading the bug log, it looks like the "proper" configuration in this > case is deleting all the nfs/[EMAIL PROTECTED] encryption types except > des-cbc-crc. Is this correct? Correct. In general, you never want to have Kerberos keys in your KDC f

Re: krb5 transition: upgrading to krb5 1.6.1

2007-04-29 Thread Steinar H. Gunderson
On Sun, Apr 29, 2007 at 02:02:41PM -0400, Sam Hartman wrote: > I'm aware of one issue that impacts nfs-utils. Bug #413838 describe a > problem where if your server has a common misconfiguration the 1.6 > Kerberos libraries on the client will cause mounts to fail. In > particular, the kernel only

krb5 transition: upgrading to krb5 1.6.1

2007-04-29 Thread Sam Hartman
Hi, folks. I've just uploaded krb5 1.6.1 to experimental. This is a new version with enhanced plugin support, support for realm referrals, support for storing Kerberos credentials in the Linux keyring rather than on disk, and generally improvements all around. The one big feature that is missi