Dear all, I am somewhat disturbed by that fact that the superuser is able to execute
# shisa -d --keys thereby gaining access to all passwords for all principals of the running KDC. Contrast this to the situation with MIT Kerberos or Heimdal, where a selected administrator is entrusted with the power to inspect such secrecies, which the superuser is unable to access, unless he was able to snoop the administrator's password. Am I lacking some insight, or is there a security issue here? Best regards, Mats Erik Andersson _______________________________________________ Help-shishi mailing list [email protected] https://lists.gnu.org/mailman/listinfo/help-shishi
