diff options
author | Michael Adam <obnox@samba.org> | 2012-06-12 00:30:42 +0200 |
---|---|---|
committer | Michael Adam <obnox@samba.org> | 2012-06-12 07:21:46 +0200 |
commit | 23a73c51acf33f7c5473cf6bd1b93dcf05c0d880 (patch) | |
tree | 6f146aa2dd3bffa18fbcb61e2698a40d3360de23 /source4/auth | |
parent | 6b2175c83416e7e5bcd76c79cf927ad806d4a562 (diff) | |
download | samba-23a73c51acf33f7c5473cf6bd1b93dcf05c0d880.tar.gz samba-23a73c51acf33f7c5473cf6bd1b93dcf05c0d880.tar.bz2 samba-23a73c51acf33f7c5473cf6bd1b93dcf05c0d880.zip |
s4:kerberos: fix typos in kerberos-notes.txt
Diffstat (limited to 'source4/auth')
-rw-r--r-- | source4/auth/kerberos/kerberos-notes.txt | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/source4/auth/kerberos/kerberos-notes.txt b/source4/auth/kerberos/kerberos-notes.txt index 78efe179c1..f15f3f99a3 100644 --- a/source4/auth/kerberos/kerberos-notes.txt +++ b/source4/auth/kerberos/kerberos-notes.txt @@ -527,11 +527,11 @@ SHA-1. So, nowadays, this password-based in-memory keytab is seen as too slow, and is falling into disuse. Traditional 'MIT' behaviour is to use a keytab, containing salted key -data, extracted from the KDC. (In this modal, there is no 'service +data, extracted from the KDC. (In this model, there is no 'service password', instead the keys are often simply application of random bytes). Heimdal also implements this behaviour. -The windows modal is very different - instead of sharing a keytab with +The windows model is very different - instead of sharing a keytab with each member server, a random utf-16 pseudo-textual password is stored for the whole machine. The password is set with non-kerberos mechanisms (particularly SAMR, |