From: Barry Jaspan Date: Wed, 29 May 1996 21:18:45 +0000 (+0000) Subject: remove an xxx, add a new one, update SUPPORT_DESMD5 description X-Git-Tag: krb5-1.0-beta6~33 X-Git-Url: http://git.tremily.us/?a=commitdiff_plain;h=7559252ab8500d3cb44646bd5e4f0e579d662703;p=krb5.git remove an xxx, add a new one, update SUPPORT_DESMD5 description git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@8159 dc483132-0cff-0310-8789-dd5450dbe970 --- diff --git a/doc/kadm5/api-funcspec.tex b/doc/kadm5/api-funcspec.tex index 8df131cd9..c79d3dbe1 100644 --- a/doc/kadm5/api-funcspec.tex +++ b/doc/kadm5/api-funcspec.tex @@ -73,11 +73,14 @@ principal. See section \ref{sec:keys} for details. retrieved {\it by local clients only}. This is necessary in order for the kadm5 API to provide the primary Kerberos database interface. -\item The KADM5 authorization system has been completely changed. XXX -Function semantics still refer only to the old method. +\item The KADM5 authorization system has been completely changed. \item The functions kadm5_flush, kadm5_get_principals, and kadm5_get_policies have been added. + +\item The KADM5 API now obeys a caller-allocates rather than +callee-allocates system. kadm5_get_principal and kadm5_get_policy +(XXX not yet!) are affected. \end{enumerate} \end{description} @@ -255,10 +258,27 @@ if the server has this bit set. password has expired will succeed if this bit is set on the server. Also see KRB5_KDC_REQUIRES_PWCHANGE. -\item[KRB5_KDB_SUPPORT_DESMD5] An AS_REQ for a principal with this bit -set and an encrytion type of ENCTYPE_DES_CBC_CRC causes the encryption -type ENCTYPE_DES_CBC_MD5 to be used instead. XXX Why set this bit -instead of just changing the service principal's enctype? +\item[KRB5_KDB_SUPPORT_DESMD5] This bit indicates that the principal +understands ENCTYPE_DES_MD5 and therefore that that encryption type +should be used whenever a DES encryption type is request (implicitly +assuming that it is the best DES-based encryption type available, +which may not be the case if we implement ENCTYPE_DES_SHA for +example). The bit is employed during an AS_REQ and a TGS_REQ whenever +the a key to be used is ENCTYPE_DES_CRC; if this bit is set (and if +the client listed MD5 in its request, in the case of a session key), +ENCTYPE_DES_MD5 is used instead. + +This bit is basically a kludge to save space in the KDC database. +Without it, a service that supported DES with CRC and MD5 would have +to have two separate key_data entries in the database, differing only +in encryption type. This bit allows a principal to have only a single +key, using CRC, because it tells the KDC that the same key can be used +with MD5. + +This solution will not scale well to handle the inevitable future +situation of multiple salt types with DES3 or other encryption +systems. A better solution is needed; perhaps the redundant key data +should just be stored in the database. \item[KRB5_KDB_NEW_PRINC] If this bit is set, the principal is still being ``created'' and the administration system should allow