add some text about salting and an example of kadmind.acl from
lha@stacken.kth.se git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@9546 ec53bebd-3082-4978-b11e-865c3cabbd6b
This commit is contained in:
@@ -11,6 +11,7 @@
|
|||||||
* Testing clients and servers::
|
* Testing clients and servers::
|
||||||
* Slave Servers::
|
* Slave Servers::
|
||||||
* Incremental propagation::
|
* Incremental propagation::
|
||||||
|
* Salting::
|
||||||
@end menu
|
@end menu
|
||||||
|
|
||||||
A
|
A
|
||||||
@@ -217,6 +218,20 @@ the principal to only apply for the subjects that match the pattern.
|
|||||||
The patters are of the same type as those used in shell globbing, see
|
The patters are of the same type as those used in shell globbing, see
|
||||||
@url{none,,fnmatch(3)}.
|
@url{none,,fnmatch(3)}.
|
||||||
|
|
||||||
|
In the example below @samp{lha/admin} can change every principal in the
|
||||||
|
database. @samp{jimmy/admin} can only modify principals that belong to
|
||||||
|
the realm @samp{E.KTH.SE}. @samp{mille/admin} is working at the
|
||||||
|
helpdesk, so he should only be able to change the passwords for single
|
||||||
|
component principals (ordinary users). He will not be able to change any
|
||||||
|
@samp{/admin} principal.
|
||||||
|
|
||||||
|
@example
|
||||||
|
lha/admin@E.KTH.SE all
|
||||||
|
jimmy/admin@E.KTH.SE all *@E.KTH.SE
|
||||||
|
jimmy/admin@E.KTH.SE all */*@E.KTH.SE
|
||||||
|
mille/admin@E.KTH.SE change-password *@E.KTH.SE
|
||||||
|
@end example
|
||||||
|
|
||||||
@node Password changing, Testing clients and servers, Remote administration, Setting up a realm
|
@node Password changing, Testing clients and servers, Remote administration, Setting up a realm
|
||||||
@section Password changing
|
@section Password changing
|
||||||
|
|
||||||
@@ -320,7 +335,7 @@ automate this you will want to start
|
|||||||
Starting the propagation once an hour from @code{cron} is probably a
|
Starting the propagation once an hour from @code{cron} is probably a
|
||||||
good idea.
|
good idea.
|
||||||
|
|
||||||
@node Incremental propagation, , Slave Servers, Setting up a realm
|
@node Incremental propagation, Salting , Slave Servers, Setting up a realm
|
||||||
@section Incremental propagation
|
@section Incremental propagation
|
||||||
|
|
||||||
There is also a newer and still somewhat experimental mechanism for
|
There is also a newer and still somewhat experimental mechanism for
|
||||||
@@ -375,3 +390,44 @@ this signal. Then, start @code{ipropd-slave} on all the slaves:
|
|||||||
master# /usr/heimdal/libexec/ipropd-master &
|
master# /usr/heimdal/libexec/ipropd-master &
|
||||||
slave# /usr/heimdal/libexec/ipropd-slave master &
|
slave# /usr/heimdal/libexec/ipropd-slave master &
|
||||||
@end example
|
@end example
|
||||||
|
|
||||||
|
@node Salting, , Incremental propagation, Setting up a realm
|
||||||
|
@section Salting
|
||||||
|
@cindex Salting
|
||||||
|
|
||||||
|
Salting is used to make it harder to precalculate all possible
|
||||||
|
keys. Using a salt increases the search space to make it almost
|
||||||
|
impossible to precalculate all keys. In salting you just append the salt
|
||||||
|
to the password, or somehow merge the password with the salt.
|
||||||
|
|
||||||
|
In Kerberos 5 the salting is determined by the encryption-type, except
|
||||||
|
in case of @code{des}. In @code{des} there is the kerberos 4 salting
|
||||||
|
(none at all) or the afs-salting (using the cell (realm in
|
||||||
|
afs-lingo)). @code{[kadmin]default_keys} in @file{krb5.conf} controls
|
||||||
|
what salting to use,
|
||||||
|
|
||||||
|
The syntax of @code{[kadmin]default_keys} is
|
||||||
|
@samp{[etype:]salt-type[:salt-string]}. @samp{etype} is the encryption
|
||||||
|
type (des, des3, arcfour), @code{salt-type} is the type of salt (pw-salt
|
||||||
|
or afs3-salt), and the salt-string is the string that will be used as
|
||||||
|
salt (remember that if the salt is appened/prepended, the empty salt ""
|
||||||
|
is the same thing as no salt at all).
|
||||||
|
|
||||||
|
Common types of salting includes
|
||||||
|
|
||||||
|
@itemize
|
||||||
|
@item @code{v4} (or @code{des:pw-salt:})
|
||||||
|
|
||||||
|
The Kerberos 4 salting is using no salt att all. Reson there is colon
|
||||||
|
that the end is that
|
||||||
|
|
||||||
|
@item @code{v5} (or @code{pw-salt})
|
||||||
|
|
||||||
|
@code{pw-salt} means all regular encryption-types that is regular
|
||||||
|
|
||||||
|
@item @code{afs3-salt}
|
||||||
|
|
||||||
|
@code{afs3-salt} is the salting that is used with Transarc kaserver. Its
|
||||||
|
the cell appended to the password.
|
||||||
|
|
||||||
|
@end itemize
|
||||||
|
Reference in New Issue
Block a user