Dear all,

I am somewhat disturbed by that fact that the superuser
is able to execute

   # shisa -d --keys

thereby gaining access to all passwords for all principals
of the running KDC.

Contrast this to the situation with MIT Kerberos or Heimdal,
where a selected administrator is entrusted with the power to
inspect such secrecies, which the superuser is unable to access,
unless he was able to snoop the administrator's password.

Am I lacking some insight, or is there a security issue here?

Best regards,
  Mats Erik Andersson

_______________________________________________
Help-shishi mailing list
[email protected]
https://lists.gnu.org/mailman/listinfo/help-shishi

Reply via email to