From 23a73c51acf33f7c5473cf6bd1b93dcf05c0d880 Mon Sep 17 00:00:00 2001 From: Michael Adam Date: Tue, 12 Jun 2012 00:30:42 +0200 Subject: s4:kerberos: fix typos in kerberos-notes.txt --- source4/auth/kerberos/kerberos-notes.txt | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) (limited to 'source4/auth') diff --git a/source4/auth/kerberos/kerberos-notes.txt b/source4/auth/kerberos/kerberos-notes.txt index 78efe179c1..f15f3f99a3 100644 --- a/source4/auth/kerberos/kerberos-notes.txt +++ b/source4/auth/kerberos/kerberos-notes.txt @@ -527,11 +527,11 @@ SHA-1. So, nowadays, this password-based in-memory keytab is seen as too slow, and is falling into disuse. Traditional 'MIT' behaviour is to use a keytab, containing salted key -data, extracted from the KDC. (In this modal, there is no 'service +data, extracted from the KDC. (In this model, there is no 'service password', instead the keys are often simply application of random bytes). Heimdal also implements this behaviour. -The windows modal is very different - instead of sharing a keytab with +The windows model is very different - instead of sharing a keytab with each member server, a random utf-16 pseudo-textual password is stored for the whole machine. The password is set with non-kerberos mechanisms (particularly SAMR, -- cgit