[opensuse] hacking a Kerberos cache file
12.1 Hi everyone. Can't find anything below rocket scientist level on this. I've a kerberized process running under k5start which uses a keytab to authenticate, refresh its ticket and so keep on going. The process runs under a unique uid:gid. By default, the ticket caches go into /tmp. Everyone has access to /tmp so I'd like to put this cache somewhere else. I've thought about creating something under /var/cache with 600 uid:gid 1. Is there a correct place for stuff like this? 2. Google tells me that it currently takes around 8 hours to crack a Kerberos key. Does the cache file contain stuff which would give the hacker a head start? Thanks, L x -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org
participants (1)
-
lynn