Not sure - I'm not exactly an AFS subject matter expert and I haven't
seen the AFS code that implements the key retrieval (from KeyFile)
and token validation.

When I first started looking at MIT's krb524, this was the first problem
we saw. [the 524 client setting the lifetimes incorrectly was the other,
as apparently the resulting V4 ticket lifetimes are not communicated
back to the client over the 524 wire protocol and the client is
setting it based on 5 minute increments in the V4 ticket, not the
CMU/AFS lifetime interpretation].

I noticed the kvno returned was "0", while the actual kvno for our afs
principal was "1" (as seen via kadmin).  Given the error and the
observed behavior wrt kvno, the fix was rather straight forward.

Perhaps your afs server uses different criteria for key
retrieval. We're only now starting to roll out OpenAFS. Our
observations were made with Transarc AFS, versios 3.x. Sorry I don't
have a good answer for this.

>>>>> "Ken" == Ken Hornstein <[EMAIL PROTECTED]> writes:

>> There is also a bug in krb524d that does not set the kvno on the
>> returned V4 ticket. Here's a patch:

Ken> Interesting ... so what triggers this?  I mean, it seems to work
Ken> in normal circumstances ...

Ken> --Ken
________________________________________________
Kerberos mailing list           [EMAIL PROTECTED]
http://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to