> "Marcus" == Marcus Better <[EMAIL PROTECTED]> writes:
Marcus> Russ Allbery wrote:
>> Correct. In general, you never want to have Kerberos keys in
>> your KDC for a service principal for enctypes that that service
>> doesn't support.
Marcus> Is there an easy way to find
Marcus Better <[EMAIL PROTECTED]> writes:
> Russ Allbery wrote:
>> Correct. In general, you never want to have Kerberos keys in your KDC
>> for a service principal for enctypes that that service doesn't support.
> Is there an easy way to find out which enctypes a service supports? (And
> why doe
Russ Allbery wrote:
> Correct. In general, you never want to have Kerberos keys in your KDC for
> a service principal for enctypes that that service doesn't support.
Is there an easy way to find out which enctypes a service supports? (And why
does the poor admin have to worry about this at all?)
Steinar H Gunderson <[EMAIL PROTECTED]> writes:
> Reading the bug log, it looks like the "proper" configuration in this
> case is deleting all the nfs/[EMAIL PROTECTED] encryption types except
> des-cbc-crc. Is this correct?
Correct. In general, you never want to have Kerberos keys in your KDC f
On Sun, Apr 29, 2007 at 02:02:41PM -0400, Sam Hartman wrote:
> I'm aware of one issue that impacts nfs-utils. Bug #413838 describe a
> problem where if your server has a common misconfiguration the 1.6
> Kerberos libraries on the client will cause mounts to fail. In
> particular, the kernel only
Hi, folks.
I've just uploaded krb5 1.6.1 to experimental. This is a new version
with enhanced plugin support, support for realm referrals, support for
storing Kerberos credentials in the Linux keyring rather than on disk,
and generally improvements all around. The one big feature that is
missi
6 matches
Mail list logo