[1956] in Kerberos_V5_Development

home help back first fref pref prev next nref lref last post

Re: krb5-libs/182: /etc/v5srvtab -> /etc/krb5.keytab

daemon@ATHENA.MIT.EDU (Barry Jaspan)
Wed Nov 13 12:54:03 1996

Date: Wed, 13 Nov 1996 12:53:41 -0500
From: "Barry Jaspan" <bjaspan@MIT.EDU>
To: tlyu@MIT.EDU
Cc: krbdev@MIT.EDU, krb5-bugs@MIT.EDU
In-Reply-To: <9611131728.AA27510@tesla-coil.MIT.EDU> (message from Tom Yu on
	Wed, 13 Nov 1996 12:28:23 -0500)


   ovsec_kadmd.c was relying on the old
   global variable mechanism (krb5_defkeyname) to set the default keytab
   name for the gssapi/krb5 layer.  This violates abstactions right and
   left.

If I recall properly, kadmind sets krb5_defkeyname because there was
no other way to specify the keytab that the GSS-API krb5 mechanism
will use to accept a context.  Perhaps now we can use KRB5_KTNAME, but
that environment variable did not exist when kadmind was implemented.
I'm not sure how that interacts with secure/unsecure contexts, nor
which kadmind is using.

   For that matter why are the kadm5 tests passing?

The client-side kadm5 tests use a credential cache, not a keytab, to
authenticate to kadmind.  The server-side kadm5 tests do not use any
Kerberos authentication at all.  So, neither set of kadm5 api tests
need to specify a keytab to use.

   Anyone have any bright ideas on this subject?  

Yes, I do.  Back out your changes and leave them for post-1.0.

Barry

home help back first fref pref prev next nref lref last post