On 5/22/20 2:29 PM, Joshua Brodie wrote:
> How can I find out the out of the box default password encryption used?
Kerberos doesn't encrypt passwords(*), but it does store long-term keys
derived from the passwords. This derivation, called the "string-to-key"
operation for the e
Hi there:
How can I find out the out of the box default password encryption used?
On a getprinc -- there are 8 shown -- are these all used for the principal?
Number of keys: 8
Key: vno 8, aes256-cts-hmac-sha1-96
Key: vno 8, aes128-cts-hmac-sha1-96
Key: vno 8, des3-cbc-sha1
Key: vno 8, arcfour
EALM2 it keeps working in REALM1 and it does not in REALM2.
Is it because the master_key is salted, too?
Any comments welcome.
Cheers
Tom
--
View this message in context:
http://kerberos.996246.n3.nabble.com/LDAP-Stunt-Password-Encryption-in-Kerberos-Backend-misunderstood-tp36273.html
Sent fr