On Wed, 2012-07-11 at 10:19 -0400, Qing Chang wrote:
> I think I do have it configured already:
> =====
> krbSupportedEncSaltTypes: aes256-cts:normal
> krbSupportedEncSaltTypes: aes256-cts:special
> krbSupportedEncSaltTypes: aes128-cts:normal
> krbSupportedEncSaltTypes: aes128-cts:special
> krbSupportedEncSaltTypes: des3-hmac-sha1:normal
> krbSupportedEncSaltTypes: des3-hmac-sha1:special
> krbSupportedEncSaltTypes: arcfour-hmac:normal
> krbSupportedEncSaltTypes: arcfour-hmac:special
> krbSupportedEncSaltTypes: des-hmac-sha1:normal
> krbSupportedEncSaltTypes: des-cbc-md5:normal
> krbSupportedEncSaltTypes: des-cbc-crc:normal
> krbSupportedEncSaltTypes: des-cbc-crc:v4
> krbSupportedEncSaltTypes: des-cbc-crc:afs3
> krbDefaultEncSaltTypes: aes256-cts:special
> krbDefaultEncSaltTypes: aes128-cts:special
> krbDefaultEncSaltTypes: des3-hmac-sha1:special
> krbDefaultEncSaltTypes: arcfour-hmac:special
> =====
> 
> As I mentioned, I can create keytabs with des-cbc-crc:normal and 
> des-cbc-crc:afs3,
> but not with des-cbc-crc:v4, which is what OpenAFS uses.
> 
> Qing
> 
> On 11/07/2012 8:28 AM, Simo Sorce wrote:
> > On Tue, 2012-07-10 at 15:53 -0400, Qing Chang wrote:
> >> please forgive me if this is a question that has been answered somewhere 
> >> already.
> >>
> >> I am almost finished setting up my first OpenAFS cell using IPA's KDC for
> >> authentication but stumble on this error:
> >>
> >> [root@smb1 ~]# fs setacl /afs system:anyuser rl
> >> fs: You don't have the required access rights on '/afs'
> >>
> >> A thread on OpenAFS mailing list suggests that it is because I have wrong 
> >> salt
> >> with my afs service key. The right one should be "des-cbc-crc:v4", but 
> >> following fails
> >> when I tried to cretae the keytab file:
> >> ====
> >> [root@smb1 ~]# ipa-getkeytab --server ipa2.sri.utoronto.ca -p
> >> afs/openafs.sri.utoronto...@sri.utoronto.ca --keytab /etc/afs.keytab -e 
> >> des-cbc-crc:v4 -P
> >> New Principal Password:
> >> Verify Principal Password:
> >> Bad or unsupported salt type (1)!
> >> Failed to create key material

OK, I just checkjed the code and found out that we do not support
creating keys with the 'v4' salt type in the ipa code.

I am not sure why I skipped that salt type when I coded it up.
Probably because it is basically obsolete (and amounts to unsalted keys)
and the only thing that still uses it is AFS which uses DES that is also
a completely deprecated and insecure algorithm these days.

Unfortunately it is not something that can be changed via some
parameter, if this is really needed I can only suggest opening a ticket
in freeipa trac instance.

But can't AFS use some decent crypto these days, like AES ?

Simo.


-- 
Simo Sorce * Red Hat, Inc * New York

_______________________________________________
Freeipa-users mailing list
Freeipa-users@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-users

Reply via email to