[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Pre-Expired Passwords



On Mon, Oct 03, 2005 at 03:52:47PM -0700, Henry B. Hotz wrote:
> I don't know how MIT does this, but it would be nice to create some new  
> principals with a "must change" status.  In other words the only thing  
> they are good for is changing the password, giving them a normal status  
> after that.

i used to do this by setting the password-expiration to some date
already past (e.g., 2000-01-01), which is, yes, a kludge

> 
> An obvious way (to me) to do this would be to special-case the AS-REQ  
> processing for kadmin/changepw so it won't fail if the principal has an  
> expired password (if everything else is OK).  Then the user can use the  
> password change service, but nothing else.

this is indeed the case, b/c the kadmin/changepw entry is set up
with a pwchange-service attribute in the realm database and the KDC
makes an exception for such services when determining whether to
issue a ticket or not and finds the client's key expired

> If they change their  
> password then I think the existing code would just compute a new  
> expiration date and everything becomes normal.

looks like the code (i'm looking at a very old copy in OpenBSD's
cvsweb) bumps the password expiration 365 days from the instant of
password change by default or by the krb5.conf [kadmin]
password_lifetime setting on the kpasswdd server

--buck

> 
> Problems?  Better way to do it?  Heimdal already has a way to do it I  
> don't know about?
> ------------------------------------------------------------------------ 
> ----
> The opinions expressed in this message are mine,
> not those of Caltech, JPL, NASA, or the US Government.
> Henry.B.Hotz@jpl.nasa.gov, or hbhotz@oxy.edu
> 
>