[OpenAFS-devel] Testing: how to generate random valid KeyFile without kerberos

Jeffrey Altman jaltman@secure-endpoints.com
Mon, 17 Sep 2012 04:56:02 -0400


This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig2EDBF4BAE9CA10F2DC6041C3
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

DES keys have parity checks built in.   Your made up key probably
is not valid.

Exercise: add a check for key validity to asetkey in the add key from=20
command line case.


On Monday, September 17, 2012 12:01:48 AM, Troy Benjegerdes wrote:
> I'm attempting to automate creation of a new cell in a VM,
> and I'd like to be able to create a random KeyFile without ever
> using Kerberos.
>
> I can't seem to get it to work right (bos communications fail),
> so I'm wondering if someone has a working example of this.
>
>
> root@amd64:~# asetkey add 1 "deadbeefbabeb00b"
> root@amd64:~# bos_util list
> kvno    0: key is '=EF=BF=BD=EF=BF=BD
>                        ' '\336\255\276\357\272\276\260\013'
> kvno    1: key is '=EF=BF=BD=EF=BF=BD
>                        ' '\336\255\276\357\272\276\260\013'
> All done.
>
>
> I get errors like this:
>
>
> root@amd64:~# bos status -localauth -server localhost
> In tkt_MakeTicket: key_sched returned -1
> bos: running unauthenticated
> bos: failed to contact host's bosserver (communications failure (-1)).
> root@amd64:~# ps uax | grep bos
> root       956  0.2  3.4   9820  4180 ?        Ss   03:55   0:00 /usr/s=
bin/bosserver
> root       960  5.0  0.5   6028   656 tty1     S+   03:55   0:00 grep b=
os
>
>
>
>
> _______________________________________________
> OpenAFS-devel mailing list
> OpenAFS-devel@openafs.org
> https://lists.openafs.org/mailman/listinfo/openafs-devel


--------------enig2EDBF4BAE9CA10F2DC6041C3
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (MingW32)

iQEcBAEBAgAGBQJQVuWlAAoJENxm1CNJffh45GMIANeUGLdNb4kFt0YCnnLcgpSu
kz5DjaDH6P1RGBsuw4Goh/2Snjag73hCih76Prem5fsxx+aj1xVGrSNr3TQAUC6c
fDWCzNOeJC4lEnMjpIp8ejITPosoLaVdRzsDTlLRtx9H8r+HcqFY8+sh0p0hojv5
+4sj0MOsfFrCNnZcZEwU+Z3CQA0w+svPKz+AF15Z+myIwkfBCsGBzZwng2WERq7j
b2OmXCgUEioiZhQXugw/24NwDTb8/hCKLiIU6VKGO4D0q/JJCILpIIcKFJuGu2G7
oNaIBW1EnXlA2nGh8ZgHYTqh0LsZgA4qYtTZbwyRkLhorm1rWHPNB3P/aKveLeQ=
=IhvH
-----END PGP SIGNATURE-----

--------------enig2EDBF4BAE9CA10F2DC6041C3--