Re: windows and smartcards

2022-05-05 Thread Ken Hornstein via Kerberos
>gotcha, thank you very much for all the help. >I guess just out of curiosity: >- for windows: there are other tools such as heimdall and microsoft >kerberos. with those I don't know if you ever played around with them or >know if they support smartcard and pin authentication to get a ticket >manua

Re: windows and smartcards

2022-05-04 Thread Prabin Tamang
gotcha, thank you very much for all the help. I guess just out of curiosity: - for windows: there are other tools such as heimdall and microsoft kerberos. with those I don't know if you ever played around with them or know if they support smartcard and pin authentication to get a ticket manually. m

Re: windows and smartcards

2022-05-04 Thread Prabin Tamang
Hi, for more information on this" - People I work with have adapted the stock MIT Kerberos PKINIT plugin to work on Windows. Do you have any sort of documentation that you can point me to on how to make this work with windows. And also Mac as, we also have Mac users. Currently, my main focus i

Re: windows and smartcards

2022-05-04 Thread Ken Hornstein via Kerberos
>for more information on this" >- People I work with have adapted the stock MIT Kerberos PKINIT plugin > to work on Windows. > >Do you have any sort of documentation that you can point me to on how to >make this work with windows. And also Mac as, we also have Mac users. Unfortunately, no (at lea

Re: windows and smartcards

2022-05-04 Thread Ken Hornstein via Kerberos
>i was wondering if the question listed in the link below was ever answered >and if not, i was hoping you could provide please. >https://mailman.mit.edu/pipermail/kerberos/2010-September/016423.html I can provide a quick summary: - Current stock MIT Kerberos for Windows does not support pkinit (t

Re: windows kerberos update?

2019-02-20 Thread Charles Hedrick
I just verified that OTP does work. Thanks. > On Jan 16, 2019, at 12:01 PM, Greg Hudson wrote: > > On 1/16/19 11:23 AM, Charles Hedrick wrote: >> We’re starting to use Windows Kerberos, with a 3rd party login screen that >> calls Kerberos. Some of our staff use FreeOTP 2FA. As far as I can tell

Re: windows kerberos update?

2019-01-17 Thread Charles Hedrick
Thanks. We’ll try to OTP. If there’s no PKINIT, I guess that means the armor will have to come from the machine credentials. That should be workable. A couple of us do kinit from home on the Mac. I don’t have a long list of people asking for it for Windows, but if a couple of people do it for Ma

Re: windows kerberos update?

2019-01-16 Thread Greg Hudson
On 1/16/19 11:23 AM, Charles Hedrick wrote: > We’re starting to use Windows Kerberos, with a 3rd party login screen that > calls Kerberos. Some of our staff use FreeOTP 2FA. As far as I can tell, the > most recent KfW doesn’t support 2FA or the https: proxy. KfW 4.1 is based on krb5 1.13, which

Re: Windows Server 2016 - KDC has no support for encryption type while getting initial credentials

2018-11-09 Thread Silambarasan Madhappan
Thank you, Todd Grayson for detailed information. On Thu, Nov 8, 2018 at 10:07 PM Todd Grayson wrote: > > oops, typo by me: > > You are hard forcing AES for initial ticket granting ticket with the settings > you are using for enctypes. > > Should read > > You are hard forcing AES for initial sess

Re: Windows Server 2016 - KDC has no support for encryption type while getting initial credentials

2018-11-08 Thread Todd Grayson
oops, typo by me: You are hard forcing AES for initial ticket granting ticket with the settings you are using for enctypes. Should read You are hard forcing AES for initial session key and ticket granting ticket with the settings you are using for enctypes. On Thu, Nov 8, 2018 at 9:35 AM Todd G

Re: Windows Server 2016 - KDC has no support for encryption type while getting initial credentials

2018-11-08 Thread Todd Grayson
You are hard forcing AES for initial ticket granting ticket with the settings you are using for enctypes. Unset (comment out) the 3 enctype lines for one of your tests. How to comment out lines in the krb5.conf is covered in the second paragraph here: https://web.mit.edu/kerberos/krb5-latest/do

Re: Windows 2012R2 & MIT Kerberos Trust / SSO

2016-08-21 Thread Mauricio Tavares
There are ways to sync the AD server with the KDC, so in effect they are separate but equal. On Aug 20, 2016 12:14 PM, "Darren Terry" wrote: List, I am currently working on a project where I am required to integrate a Windows 2012R2 domain with an existing Kerberos realm. The domain has not bee

Re: Windows

2015-11-19 Thread Randolph Morgan
I noticed that I made a minor mistake when I typed the key, it should read: HKEY_CURRENT_USER\SOFTWARE\MIT\MIT Kerberos\Settings Randy Randy Morgan CSR Department of Chemistry and Biochemistry Brigham Young University 801-422-4100 On 11/18/2015 7:14 PM, Benjamin Kaduk wrote: > On Wed, 18 Nov 201

Re: Windows

2015-11-18 Thread Benjamin Kaduk
On Wed, 18 Nov 2015, Randolph Morgan wrote: > I found the answer to my question, so I thought I would share it with others > here on the list. To get Windows to acknowledge that a ticket has been issued Thank you for following up! > through MIT Kerberos KfW 4.0.1 you need to edit a registry key

Re: Windows

2015-11-18 Thread Randolph Morgan
I found the answer to my question, so I thought I would share it with others here on the list. To get Windows to acknowledge that a ticket has been issued through MIT Kerberos KfW 4.0.1 you need to edit a registry key. The key is located at: HKEY_CURRENT_USER\SOFTWARE\MIT Kerberos\Settings.

Re: Windows

2015-11-16 Thread Benjamin Kaduk
On Mon, 16 Nov 2015, Randolph Morgan wrote: > I have installed MIT Kerberos 4.0.1 on a Windows 10 machine. Everything > I have read indicates that the identity manager is not integrated into > the new ticket manager. Ticket manager shows that I have received a I'm not sure what you mean by these

Re: Windows KDC - Delegation Option

2014-04-28 Thread Vipul Mehta
Yes, the TGT is passed directly by the host. Please read the section "Messages in the Forwarding Process" here : http://technet.microsoft.com/en-us/library/4a1daa3e-b45c-44ea-a0b6-fe8910f92f28 It explains the steps clearly with the diagram. On Sat, Apr 26, 2014 at 3:34 AM, Ben H wrote: > That

KfW 4.x (was Re: Windows KDC - Delegation Option)

2014-04-26 Thread Benjamin Kaduk
Hi Ben, On Fri, 25 Apr 2014, Ben H wrote: > That's interesting - thank you. I was able to actually validate what you > stated by installing MIT Kerberos on my Window system and then configuring > Putty's GSSAPI option to use the MIT GSSAPI libraries as preference. > My first attempt with kfw-4.0

Re: Windows KDC - Delegation Option

2014-04-25 Thread Greg Hudson
On 04/25/2014 11:49 PM, Ben H wrote: > Based on your prior explanation I can't help but infer this means that > although the new forwardable TGT session key may be different than my > original TGT, it is still shared between all hosts that I delegate to, > leading to a possible attack against all s

Re: Windows KDC - Delegation Option

2014-04-25 Thread Russ Allbery
Ben H writes: > Based on your prior explanation I can't help but infer this means that > although the new forwardable TGT session key may be different than my > original TGT, it is still shared between all hosts that I delegate to, > leading to a possible attack against all systems should one be

Re: Windows KDC - Delegation Option

2014-04-25 Thread Ben H
Thanks again. I confirmed that the [domain_realm] entry worked both on a unix host and on my kfw-3.2.2 install. Once added, no referral was needed and only one entry shows in the cache. Interestingly, in respect to your information on the forwarded ticket TGS request, I found that Windows impleme

Re: Windows KDC - Delegation Option

2014-04-25 Thread Greg Hudson
On 04/25/2014 07:16 PM, Ben H wrote: > Is there some way to show a mapping that these two tickets are really > identical? In theory it would be possible to checksum the tickets and tell that they are the same, but list doesn't know how to do this. > Is the empty realm display really necessary onc

Re: Windows KDC - Delegation Option

2014-04-25 Thread Ben H
Great - thanks Greg - beginning to be much clearer. So the TGT from B is actually a full request for the forwardable ticket (not just a notification) and it gets sent right to the remote machine and not cached locally. I can confirm this with the issued time stamp not changing on the host, but sho

Re: Windows KDC - Delegation Option

2014-04-25 Thread Greg Hudson
On 04/25/2014 06:04 PM, Ben H wrote: > 04/25/14 16:34:02 04/26/14 02:31:06 host/centos64-01.mydomain.local@ > Flags: FA > 04/25/14 16:34:02 04/26/14 02:31:06 > host/centos64-01.mydomain.local@MYDOMAIN.LOCAL > Flags: FA These are the same ticket cached under two diffe

Re: Windows KDC - Delegation Option

2014-04-25 Thread Ben H
That's interesting - thank you. I was able to actually validate what you stated by installing MIT Kerberos on my Window system and then configuring Putty's GSSAPI option to use the MIT GSSAPI libraries as preference. My first attempt with kfw-4.0.1 was unsuccessful and I suspect it has to do with

Re: Windows KDC - Delegation Option

2014-04-25 Thread Vipul Mehta
Your understanding is correct but credential delegation requirements are API dependent instead of platform. For Unix : Putty uses MIT Kerberos - GSS API. When you enable delegation in putty it requests GSS_C_DELEG_FLAG instead of GSS_C_DELEG_POLICY_FLAG which doesn't check ok_as_delegate_flag, hen

Re: Windows KDC - Delegation Option

2014-04-25 Thread Ben H
Sorry to trudge up a thread a couple of months old - but I believe that the behavior I'm seeing is directly related to this and instead of coming in grasping at straws, I decided it would be best to use this as context. I have a heterogeneous environment with a windows KDC which both my user and c

Re: Windows KDC - Delegation Option

2014-02-11 Thread Vipul Mehta
@Christopher : I know about that option. I don't want to disable delegation but i want to know the correct behaviour of MIT Kerberos with KDC Option i specified. @Greg, now it's clear to me. Checked the code also. So, if initiator has requested GSS_C_DELEG_FLAG, then delegation will always be done

Re: Windows KDC - Delegation Option

2014-02-10 Thread Greg Hudson
On 02/10/2014 01:50 AM, Vipul Mehta wrote: > In windows KDC there is delegation option associated with user properties. > I've set it to "Do not trust this user for delegation" for User B i.e. User > B will not be able to use delegated credentials. I believe this option affects the ok-as-delegate

Re: Windows KDC - Delegation Option

2014-02-10 Thread Christopher D. Clausen
Try checking the "Account is sensitive and cannot be delegated" option in the user properties and see if that does what you want. (I'm not sure if it will or not, but I believe this is the option actually intended to prevent Kerberos delegation.) < Hi, > > Scenario : User A forwards his creden

Re: Windows 2008R2 USER/root preauthentication failure

2013-09-27 Thread David Thompson
On 9/26/13 3:55 PM, David Thompson wrote: > > I have a working kerberos environment, with Windows 2008R2 acting as > KDC, serving a mix of OS X and Linux (think RHEL 6) clients. > > I am trying to add ksu ability, with principals of the form USER/root, > and cannot authenticate those principals. J

Re: Windows 2008R2 USER/root preauthentication failure

2013-09-27 Thread David Thompson
On 9/26/13 9:45 PM, Benjamin Kaduk wrote: >> I have a working kerberos environment, with Windows 2008R2 acting as >> KDC, serving a mix of OS X and Linux (think RHEL 6) clients. >> >> I am trying to add ksu ability, with principals of the form USER/root, >> and cannot authenticate those principals.

Re: Windows 2008R2 USER/root preauthentication failure

2013-09-26 Thread Benjamin Kaduk
On Thu, 26 Sep 2013, David Thompson wrote: > > I have a working kerberos environment, with Windows 2008R2 acting as > KDC, serving a mix of OS X and Linux (think RHEL 6) clients. > > I am trying to add ksu ability, with principals of the form USER/root, > and cannot authenticate those principals.

Re: Windows logon Authentication using MIT kerberos(Linux)

2013-05-02 Thread Sean M. Pappalardo
Hello. On 05/02/2013 10:33 AM, Jagan kona wrote: I have installed MIT kerberos on Linux machine, and i want to authenticate windows machine user( when user logon to the workstation) with MIT kerberos on Linux (Authentication server). please provide me the steps i need to follow. i have created u

Re: Windows pkinit - failed to decode dhparams

2013-03-28 Thread Tom Yu
Reinhard Kugler writes: > There definitely is interest. We are keen to implement Kerberos with > smartcards in our network, because it pretty fits the needs. > Your support in this issue would be great! New bug report: http://krbdev.mit.edu/rt/Ticket/Display.html?id=7596 I'm not sure exact

Re: Windows Crossrealm trust with MIT Kerberos

2013-03-27 Thread Robert Wehn
Hello Chris On 26.03.2013 20:58, c.ra...@t-online.de wrote: > My Issue is now: > If I try as MIT authenticated (mapped) user "usera" on system "windc" > to access an published CIFS shared > on server" memberhost" this works great via UNC. e.g. > \memberhostpublishedFolder [2] > But if I use

Re: Windows pkinit - failed to decode dhparams

2013-03-23 Thread Reinhard Kugler
> I think we've seen this before; sometimes Windows omits the required > "q" value in the Diffie-Hellman parameters (even though it can be > trivially computed for certain well-known groups). sounds familiar. During our tests we spotted this behavior in pkinit_decode_dh_params (plugins/preauth/pki

Re: Windows pkinit - failed to decode dhparams

2013-03-22 Thread Tom Yu
Reinhard Kugler writes: > (continued...) - I accidentally sent the message while composing - sorry > > the pkinit authentication with the same certificates works fine with > ubuntu 12.04 as a client. > It seems Windows and Linux use different authentication schemes. > It read in the RFC 4556 abou

Re: Windows pkinit - failed to decode dhparams

2013-03-22 Thread Reinhard Kugler
(continued...) - I accidentally sent the message while composing - sorry the pkinit authentication with the same certificates works fine with ubuntu 12.04 as a client. It seems Windows and Linux use different authentication schemes. It read in the RFC 4556 about a diffie-hellman and public key - k

Re: Windows kerberos trust relationship conundrum...

2012-11-05 Thread Douglas E. Engert
On 11/5/2012 2:49 PM, Dyer, Rodney wrote: > Hi, > > I need some advice. I need to verify that an MIT/Windows trust option we've > wanted to work, in fact cannot work. Can someone here maybe provide some > insightful comments on our setup? > Have you looked at cross-forest trust between MOSAI

RE: Windows kerberos trust relationship conundrum...

2012-11-05 Thread Wilper, Ross A
You can access more AD brainpower by posting this to active...@mail.activedir.org or windows-h...@lists.stanford.edu - You are correct. The member server can only be a member of a single Kerberos realm (Active Directory domain) at any time. My first thought is that you need to add Top

Re: Windows Login against Linux KDC

2012-05-04 Thread Douglas E. Engert
On 5/4/2012 4:14 AM, Robert Wehn wrote: > Hi Tiago, > > start here: > http://technet.microsoft.com/en-us/library/bb742433.aspx#EDAA > Section "Using an MIT KDC with a Standalone Windows 2000 Workstation" > > Since Vista/Server 2008 Windows supports the following Eccryption Types: > AES256-CTS-HMA

Re: Windows Login against Linux KDC

2012-05-04 Thread Robert Wehn
Hi Tiago, start here: http://technet.microsoft.com/en-us/library/bb742433.aspx#EDAA Section "Using an MIT KDC with a Standalone Windows 2000 Workstation" Since Vista/Server 2008 Windows supports the following Eccryption Types: AES256-CTS-HMAC-SHA1-96 (new since Vista/2008) AES128-CTS-HMAC-SHA1-9

Re: Windows 2008 R2 problems

2010-10-31 Thread Markus Moeller
It looks like I had not cleared my windows cache. It works all fine with 2008 R2. Markus "Markus Moeller" wrote in message news:iahs8a$ig...@dough.gmane.org... > If I use RC4-hmac it works but AES 128/256 fail on Windows 2008 R2 > although > AES 128/256 works on 2008. Can anybody confirm ? H

Re: Windows 2008 R2 problems

2010-10-30 Thread Markus Moeller
If I use RC4-hmac it works but AES 128/256 fail on Windows 2008 R2 although AES 128/256 works on 2008. Can anybody confirm ? Has 2008 R2 changed something compared to 2008 ? Thank you Markus "Markus Moeller" wrote in message news:iah61u$ra...@dough.gmane.org... > Stepping through the debugger

Re: Windows 2008 R2 problems

2010-10-30 Thread Markus Moeller
Stepping through the debugger. I get an error here: in krb5int_dk_decrypt from dk_aead.c using MIT 1.8.3 260 261 /* Compare only the possibly truncated length. */ 262 if (memcmp(cksum, trailer->data.data, hmacsize) != 0) { 263 ret = KRB5KRB_AP_ERR_BAD_INTEGRITY; 264

Re: Windows 2008 R2 problems

2010-10-29 Thread Markus Moeller
"Simo Sorce" wrote in message news:20101029175054.721e9...@willson.li.ssimo.org... > On Fri, 29 Oct 2010 22:26:36 +0100 > "Markus Moeller" wrote: > >> Hi >> >> I try to use a Windows 2008 R2 server together with MIT libraries >> 1.8.1 for Negotiate authentication. It works fine with 2008 but

Re: Windows 2008 R2 problems

2010-10-29 Thread Simo Sorce
On Fri, 29 Oct 2010 22:26:36 +0100 "Markus Moeller" wrote: > Hi > > I try to use a Windows 2008 R2 server together with MIT libraries > 1.8.1 for Negotiate authentication. It works fine with 2008 but 2008 > R2 seems to have implemented > http://www.ietf.org/id/draft-zhu-negoex-02.txt which us

Re: Windows and Smartcards

2010-09-09 Thread Bram Cymet
On 09/09/2010 12:21 PM, Bram Cymet wrote: >Hi, > > I am using MIT Kerberos for windows and I am able to get a ticket using > a password just fine but I would like to use a smartcard. > > I tried setting up my krb5.ini file the same way I have it in linux > (which works great with the smart ca

Re: Windows login failing, with no errors?

2010-04-05 Thread Douglas E. Engert
Tom Medhurst wrote: > Thanks Douglas, > > I removed the policy host/wdesk3.tnet.loc using kadmin.local and added > it back in again with a known password. (ank -policy hosts > host/wdesk3.tnet.loc). > > I then used ksetup on the windows 7 machine (wdesk3) to set the > machine's password (ks

Re: Windows login failing, with no errors?

2010-04-05 Thread Douglas E. Engert
Tom Medhurst wrote: > Hi Guys, > I'm trying to get 2 Windows Clients (1x Windows XP Pro SP3, 1x Windows > 7 Enterprise) configured so they logon via Kerberos 5-1.8 (Arch Linux > Server, Kerberos 5 build from source), and I'm s close I can smell > it! but... > > When I login I get the error m

Re: Windows event id 4 (kerberos)

2010-01-20 Thread raj esh L
. Clausen To: raj esh L Cc: kerberos@mit.edu Sent: Wed, 20 January, 2010 22:53:11 Subject: Re: Windows event id 4 (kerberos) I have no other suggestions. I'd say to try re-joining all three computers, one at a time, and see if the errors go away. The error basically means that the Ker

Re: Windows event id 4 (kerberos)

2010-01-20 Thread raj esh L
@mit.edu Sent: Thu, 21 January, 2010 0:57:26 Subject: Re: Windows event id 4 (kerberos) raj esh L wrote: > We have observed Kerberos event id4 on one member server (Print server > )BRAPRINT001 (10.1.37.167). Please find the description below about the event > id. Can some one please help

Re: Windows event id 4 (kerberos)

2010-01-20 Thread Douglas E. Engert
raj esh L wrote: > We have observed Kerberos event id4 on one member server (Print server > )BRAPRINT001 (10.1.37.167). Please find the description below about the event > id. Can some one please help me on it ? > > Event Type:Error > Event Source: Kerberos > Event Catego

Re: Windows event id 4 (kerberos)

2010-01-20 Thread Christopher D. Clausen
ng over there. But I could not understand it. > > It's my humble request to verify those and make me understand. > > > > > > From: Christopher D. Clausen > To: raj esh L > Cc: kerberos@mit.edu > Sent: Wed, 20 January, 2010 21:15:

Re: Windows event id 4 (kerberos)

2010-01-20 Thread raj esh L
ames are appearing over there. But I could not understand it.   It's my humble request to verify those and make me understand. From: Christopher D. Clausen To: raj esh L Cc: kerberos@mit.edu Sent: Wed, 20 January, 2010 21:15:13 Subject: Re: Windows e

Re: Windows event id 4 (kerberos)

2010-01-20 Thread raj esh L
Please let me know if any other information is required. From: raj esh L To: Christopher D. Clausen Cc: kerberos@mit.edu Sent: Wed, 20 January, 2010 3:47:11 Subject: Re: Windows event id 4 (kerberos) Than Q very much for your information and would appreciate.

Re: Windows event id 4 (kerberos)

2010-01-20 Thread Christopher D. Clausen
3 > TCP Statistics for IPv4 > Failed Connection Attempts = 4275 > Segments Retransmitted = 24512 > UDP Statistics for IPv4 > Receive Errors = 22753 > > > Please let me know if any other information is required. > > > > > >

Re: Windows event id 4 (kerberos)

2010-01-19 Thread raj esh L
understand clearly about the description. if you would explain what is going here with examples of server names based on description that would be great. From: Christopher D. Clausen To: raj esh L Cc: kerberos@mit.edu Sent: Wed, 20 January, 2010 3:01:30 S

Re: Windows event id 4 (kerberos)

2010-01-19 Thread Christopher D. Clausen
Is this for an actual Windows computer? Or a non-Windows machine running something like Samba? - I see these all the time. I believe these occur on occation when a computer account automatically updates its machine account password in Active Directory. (This is a normal function of a co

Re: windows 2003 domain controller, mod_auth_kerb in linux, issuewitt kerberos

2009-07-15 Thread Christopher D. Clausen
Windows AD accounts require "allow this account to be trusted for delegation" to have Internet Explore actually delegate credentials to the web server (which you are requesting via the KrbSaveCredentials On parameter.) Try turning this off and see if it does what you want. Also, (and this is p

Re: windows 2003 domain controller, mod_auth_kerb in linux, issue witt kerberos

2009-07-10 Thread Nikolay Shopik
And you are enabled "Integrated windows authentication" option in IE6, don't you? On 10.07.2009 19:20, Ahmar Nauman wrote: > > Hi, > > I'm using windows server 2003 as domain controller, > i've succesfully followed all the necessary steps required for setting up > an SSO, generated keytab

Re: Windows client authentication problem

2009-01-29 Thread Richard E. Silverman
> "VVN" == Viji V Nair writes: VVN> Hi, I am trying to authenticate windows xp clients to an MIT VVN> kerberos server. The Server is on a Linux machine and I have VVN> both windows and Linux clients on my network. I have followed the VVN> below steps, but no success. VVN

RE: windows 2003 AD and keytab file generation

2008-07-02 Thread Paul Moore
rcial product that is much easier than doing it manually with ktpass etc) -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Douglas E. Engert Sent: Wednesday, July 02, 2008 7:02 AM To: Shambhulal R. Sharma Cc: kerberos@mit.edu Subject: Re: windows 2003 AD and k

Re: windows 2003 AD and keytab file generation

2008-07-02 Thread Douglas E. Engert
Shambhulal R. Sharma wrote: > Hi All > > I am trying to use Active Directory installed on Windows Server 2003 as > KDC. I followed the Microsoft step-by-step guide > http://technet.microsoft.com/en-us/library/bb742433.aspx to create a > windows user account, ktpass command to map a service prin

Re: windows+KDC+Lib files

2008-06-26 Thread Matthew Loar
kul gupta <[EMAIL PROTECTED]> wrote: > Hi > I am trying to build a kerberos client on windows os and KDC (MIT > kerberos) lying on a linux server. > I am trying to use the kerberos krb5_get_init_creds_password() but i am not > able to find the lib files for the with the MIT kerberos windows > ins

Re: Windows not using SRV rr's to locate KDCs

2008-02-04 Thread Richard E. Silverman
Following up: a support call to Microsoft revealed magic, undocumented bits to get this working. Specifically: HKLM\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Domains\\RealmFlags = REG_DWORD #define KERB_MIT_REALM_KDC_LOOKUP 0x0001

Re: Windows Live vs Kerberos

2007-10-07 Thread Anne & Lynn Wheeler
Frank Siebenlist <[EMAIL PROTECTED]> writes: > Ahhh, pkinit history... actually, pkinit originates from the good old > DCE efforts at OSF from the 90's. > > The DCE-RFC's 68.3/4 show the evolution that Lynn talked about, where > the last 68.4 was used for the current IETF pkinit incarnation after >

Re: Windows Live vs Kerberos

2007-10-07 Thread Frank Siebenlist
Ahhh, pkinit history... actually, pkinit originates from the good old DCE efforts at OSF from the 90's. The DCE-RFC's 68.3/4 show the evolution that Lynn talked about, where the last 68.4 was used for the current IETF pkinit incarnation after some heated ietf-workgroup sessions... http://www.openg

Re: Windows Live vs Kerberos

2007-10-07 Thread Anne & Lynn Wheeler
royend <[EMAIL PROTECTED]> writes: > Can someone tell me differences between Windows Live and Kerberos? > Is it possible for instance to sat that Windows Live uses as its basis > the Needham-Schroeder protocol, the same way as Kerberos does? > > I believe that Kerberos is a more general protocol wh

Re: Windows Server Referral Problem

2007-09-03 Thread Richard E. Silverman
> "EN" == Newman, Edward (GTI) <[EMAIL PROTECTED]> writes: EN> Markus I have a request out to Microsoft to get more information EN> on this. Microsoft apparently are not following the draft IETF EN> standard as yet but have something similar (pre-draft spec) EN> implemented in

Re: Windows Server Referral Problem

2007-09-03 Thread Newman, Edward (GTI)
Markus I have a request out to Microsoft to get more information on this. Microsoft apparently are not following the draft IETF standard as yet but have something similar (pre-draft spec) implemented in 2000/2003. 09 spec shows differences in Appendix. I would check both DNS and AD: - For DNS ch

Re: Windows Server Referral Problem

2007-09-02 Thread Jeffrey Altman
Markus Moeller wrote: > Thomas, > > thank you for the pointer. I found my problem and it was related to having a > duplicated entry in another domain (uat.example.com) which I forgot about. I > had > > >EXAMPLE.COM > /| \ >

Re: Windows Server Referral Problem

2007-09-02 Thread Markus Moeller
draft. Thank you Markus - Original Message - From: Thomas Maslen To: [EMAIL PROTECTED] Sent: Saturday, September 01, 2007 7:43 PM Subject: Re: Windows Server Referral Problem My understanding is that AD searches the entire forest (presumably by doing a search in the G

Re: Windows Integration attempt #2

2007-02-08 Thread Douglas E. Engert
Quanah Gibson-Mount wrote: > > --On Thursday, February 08, 2007 7:32 AM -0500 Sam Hartman > <[EMAIL PROTECTED]> wrote: > >>> "Quanah" == Quanah Gibson-Mount <[EMAIL PROTECTED]> writes: >> Quanah> --On Wednesday, February 07, 2007 5:07 PM -0500 Sam >> Quanah> Hartman >> Quanah>

Re: Windows Integration attempt #2

2007-02-08 Thread Sam Hartman
> "Quanah" == Quanah Gibson-Mount <[EMAIL PROTECTED]> writes: Quanah> --On Thursday, February 08, 2007 7:32 AM -0500 Sam Hartman Quanah> <[EMAIL PROTECTED]> wrote: >>> "Quanah" == Quanah Gibson-Mount <[EMAIL PROTECTED]> >>> writes: >> Quanah> --On Wednesday, Fe

Re: Windows Integration attempt #2

2007-02-08 Thread Quanah Gibson-Mount
--On Thursday, February 08, 2007 7:32 AM -0500 Sam Hartman <[EMAIL PROTECTED]> wrote: >> "Quanah" == Quanah Gibson-Mount <[EMAIL PROTECTED]> writes: > > Quanah> --On Wednesday, February 07, 2007 5:07 PM -0500 Sam > Quanah> Hartman > Quanah> <[EMAIL PROTECTED]> wrote: > > >>

Re: Windows Integration attempt #2

2007-02-08 Thread Sam Hartman
> "Quanah" == Quanah Gibson-Mount <[EMAIL PROTECTED]> writes: Quanah> --On Wednesday, February 07, 2007 5:07 PM -0500 Sam Quanah> Hartman Quanah> <[EMAIL PROTECTED]> wrote: >> I would be suspicious of whether you had properly managed to >> set your machine password. Q

Re: Windows Integration attempt #2

2007-02-07 Thread Quanah Gibson-Mount
--On Wednesday, February 07, 2007 5:07 PM -0500 Sam Hartman <[EMAIL PROTECTED]> wrote: > I would be suspicious of whether you had properly managed to set your > machine password. Define "machine password". You mean the password used between the machine and the KDC for the keytab that was cre

Re: Windows Integration attempt #2

2007-02-07 Thread Sam Hartman
I would be suspicious of whether you had properly managed to set your machine password. --Sam Kerberos mailing list Kerberos@mit.edu https://mailman.mit.edu/mailman/listinfo/kerberos

Re: Windows Integration attempt #2

2007-02-02 Thread Quanah Gibson-Mount
--On February 2, 2007 5:38:37 PM -0500 Michael B Allen <[EMAIL PROTECTED]> wrote: > On Fri, 02 Feb 2007 12:03:24 -0800 > Quanah Gibson-Mount <[EMAIL PROTECTED]> wrote: > >> "The system could not log you on. Make sure your User name and domain >> are correct, then type your password again." >>

Re: Windows Integration attempt #2

2007-02-02 Thread Michael B Allen
On Fri, 02 Feb 2007 12:03:24 -0800 Quanah Gibson-Mount <[EMAIL PROTECTED]> wrote: > "The system could not log you on. Make sure your User name and domain > are correct, then type your password again." > > Well, I'm sure both are correct, and I'm sure my password is correct, > too, because the KD

Re: Windows Integration attempt #2

2007-02-02 Thread Kevin Coffman
On 2/2/07, Quanah Gibson-Mount <[EMAIL PROTECTED]> wrote: > > Principal: host/[EMAIL PROTECTED] > Expiration date: [never] > Last password change: Thu Jun 29 11:16:19 PDT 2006 > Password expiration date: [none] > Maximum ticket life: 1 day 01:00:00 > Maximum renewable life: 7 days 00:00:00 > Last m

Re: Windows Integration attempt #2

2007-02-02 Thread Russ Allbery
Kevin Coffman <[EMAIL PROTECTED]> writes: > On 2/2/07, Quanah Gibson-Mount <[EMAIL PROTECTED]> wrote: >> Any thoughts on why identical setups aren't working much appreciated. >> One other detail since I first sent this out -- My home system will now >> not allow me to become the member of a domai

Re: Windows Integration attempt #2

2007-02-02 Thread Quanah Gibson-Mount
--On February 2, 2007 4:41:23 PM -0500 Kevin Coffman <[EMAIL PROTECTED]> wrote: > On 2/2/07, Quanah Gibson-Mount <[EMAIL PROTECTED]> wrote: >> >> Any thoughts on why identical setups aren't working much appreciated. >> >> >> One other detail since I first sent this out -- My home system will no

Re: Windows Integration attempt #2

2007-02-02 Thread Kevin Coffman
On 2/2/07, Quanah Gibson-Mount <[EMAIL PROTECTED]> wrote: > > Any thoughts on why identical setups aren't working much appreciated. > > > One other detail since I first sent this out -- My home system will now not > allow me to become the member of a domain, either. Have you ruled out a firewall

Re: Windows GSSAPI ssh connection via cross-realm authentication problems

2006-08-25 Thread greg
On Aug 21, 5:36pm, "Douglas E. Engert" wrote: } Subject: Re: Windows GSSAPI ssh connection via cross-realm authentication Good day to everyone, hope the end of the week is going well. > Jason Mogavero wrote: > > > Ok, I should note that adding a .k5login file to the

Re: Windows GSSAPI ssh connection via cross-realm authentication

2006-08-22 Thread Jeffrey Altman
Jason: I think you misunderstand the role of Kerberos here. Kerberos is being using to authenticate the user by name. If the SSH service is in realm "A.EXAMPLE.COM" and the user is in realm "B.EXAMPLE.COM", the after successful authentication the SSH service knows the name as something like "[EM

Re: Windows GSSAPI ssh connection via cross-realm authentication problems

2006-08-22 Thread Jason Mogavero
Ok, I should note that adding a .k5login file to the home directory of the user I want to log in as did work. However, this setup won't work for us in the long run. The ultimate goal is to have tech support reps be able to ssh into our multitude of hosted web servers to perform basic troubleshoot

Re: Windows GSSAPI ssh connection via cross-realm authentication problems

2006-08-21 Thread Douglas E. Engert
Jason Mogavero wrote: > There is no .k5login file in the home directory...though the user account > does exist on the machine, eventually the user database is going be stored > on LDAP and there will not be individual user accounts on the ssh servers. > > > Shouldn't the ACL take precedence an

Re: Windows GSSAPI ssh connection via cross-realm authentication problems

2006-08-21 Thread Douglas E. Engert
Jason Mogavero wrote: > Ok, I should note that adding a .k5login file to the home directory of the > user I want to log in as did work. However, this setup won't work for > us in > the long run. Good. > > The ultimate goal is to have tech support reps be able to ssh into our > multitude of

Re: Windows GSSAPI ssh connection via cross-realm authentication problems

2006-08-21 Thread Jason Mogavero
There is no .k5login file in the home directory...though the user account does exist on the machine, eventually the user database is going be stored on LDAP and there will not be individual user accounts on the ssh servers. Shouldn't the ACL take precedence anyway? I don't have a .k5login in the

Re: Windows GSSAPI ssh connection via cross-realm authentication problems

2006-08-21 Thread Douglas E. Engert
Do you have a .k5login file in the home directory on the machine with the sshd? It should list the principals that are allowed to access this unix account. Note the return codes from the mm_answer_gss_userok is 1 when it worked, 0 when it did not. So it looks like the gss authenticated you but the

Re: Windows GSSAPI ssh connection via cross-realm authentication problems

2006-08-21 Thread Jason Mogavero
Ok, I found part one of my problem, in that on the non-windows KDC I had not specified an encryption type and whatever is the default was not working with the windows DC. I've fixed that and I can now get issued tickets by the non-windows KDC. Here is the kdc.log entry for my ticket generation:

Re: Windows GSSAPI ssh connection via cross-realm authentication problems

2006-08-18 Thread Douglas E. Engert
Jason Mogavero wrote: > Hello all, > >I am implementing a Kerberos/GSSAPI solution in a test environment and I > am experiencing some issues with allowed windows ssh clients to be granted > acess to the ssh server. > > The background: > > Windows AD is primary kdc with realm name KDCTEST.

Re: Windows FTP

2006-08-11 Thread Paul Palacios
We have actually made mods to FileZilla to support the CCC command to allow use through a firewall (firewall could not follow state and port commands while in 'private' or 'safe' mode. It wouldn't take too much effort to have it set the xfer channel to 'C'lear. If you still need it, email me dir

Re: windows browsers send ntlm instead of kerberos tokens

2006-08-03 Thread Achim Grolms
On Thursday 03 August 2006 04:28, Daniel B. Bailey wrote: > hello, i have a situation where SSO (Single Sign On) for Oracle Portal uses > Kerberos tokens ( Windows Authentacation) to "sign on" to an Oracle system. What Webbrowsers do you use? What KDC-Software do you use? What GSSAPI-implementatio

Re: Windows FTP

2006-07-24 Thread Mike Dopheide
Yes, we do. :) But they were written in 1998 and I can't get them to build in Windows against KfW. -Mike > NCSA had mods to the MIT ftp to run under Windows a few years ago, that > worked > with We used to use them. Goole for: ncsa ftp kerberos > > http://www.ncsa.uiuc.edu/UserInfo/Resourc

Re: Windows FTP

2006-07-24 Thread Douglas E. Engert
Mike Dopheide wrote: > Please don't laugh. NCSA had mods to the MIT ftp to run under Windows a few years ago, that worked with We used to use them. Goole for: ncsa ftp kerberos http://www.ncsa.uiuc.edu/UserInfo/Resources/Software/kerberos/ncsa_faq.html > > Some of my users have a need for

Re: Windows Clients Won't Do Kerberos

2006-06-30 Thread Markus Moeller
The mentioned is hotfix is http://support.microsoft.com/?kbid=906524 and will be available in SP3. It updates the Kerberos dll and solved for us the issue. Could you let me know if this solved your problem ? Regards Markus ""Markus Moeller"" <[EMAIL PROTECTED]> wrote in message news:[EMAIL

  1   2   3   >