Changes between Initial Version and Version 5 of Ticket #1308


Ignore:
Timestamp:
03/24/13 22:55:30 (11 years ago)
Author:
adehnert
Comment:

Legend:

Unmodified
Added
Removed
Modified
  • Ticket #1308 – Description

    initial v5  
    11Once sufficient progress has been made on Debathena #529 to let users get away without using 1DES, Debathena should stop setting `allow_weak_crypto` in `/etc/krb5.conf`. 
     2 
     3=== Status wiki === 
     4 
     5We believe that: 
     6 * On client machines, we can unset allow_weak_crypto once the users on the machine have strong keys and the servers they communicate have strong keys. 
     7 * On application servers, we can unset allow_weak_crypto once the users connecting have a vaguely recent kerberos and the server has a strong key. (If it accepts passwords, the users also need to have a strong key.) 
     8 * On the KDC, we don't care because it doesn't run Debathena. 
     9 
     10Key rolling status: 
     11 * We believe that the cert update process will roll keys, so all (active-ish) users should have updated keys by ~September even without any additional work. 
     12 * AFS servers are hard to roll, but mostly don't count because of krb5_allow_weak_crypto.html (see comment:3). 
     13 * Except for AFS (above), Server Operations' keys have all be updated (see comment:4). 
     14 * IMAP servers aren't yet rolled (do they have old software?) 
     15 * SIPB services are generally rolled (contacting the maintainers is probably reasonable for anything that isn't, but we think that's done) 
     16 * Presumably user outreach is required to get other application servers to roll their keys.