DNS configuration for Kerebos

2008-02-29 Thread Cov
I ran "krb5_newrealm" to initialise the KDC database. This give the following useful tips: ++ # krb5_newrealm This script should be run on the master KDC/admin server to initialize a Kerberos realm. It will ask you to type in a master key password.

Problem configuring kerberos delegation on a windows 2003 domain

2008-02-29 Thread Lima Valdes Emil
Hi all, I´ve been trying to configure Kerberos delegation on a Windows 2003 domain but I haven't got any good result yet. I followed a Microsoft Document on [1] to configure Kerberos in order to build a .NET 2.0 SOA solution. The following is the Kerberos trace when I try to access page A in a

Re: Problem configuring kerberos delegation on a windows 2003 domain

2008-02-29 Thread Michael B Allen
On 2/29/08, Lima Valdes Emil <[EMAIL PROTECTED]> wrote: > Kerberos trace: > 500.652> Kerb-Warn: KerbGetTgsTicket failed to unpack KDC reply: 0x3c > HTTP a_service.smnyl.com.mx Hi Emil, All of your diagnostics are very Windows specific which isn't going to translate well here. You might try t

Re: k5login & root

2008-02-29 Thread Markus Moeller
There might be one exception. If I remember right to login onto OpenSolaris/Solaris 10 with a non kerberised client (e.g. console) using pam_krb5 requires a root principal to login as root or at least have a dummy root principal key in the keytab to pass to the next pam module. Markus "Richard

OpenLDAP to Kerberos, Take 2

2008-02-29 Thread Wes Modes
Earlier I asked a few questions about OpenLDAP authenticating via Kerberos. I'm going to back up a bit and ask a more general question to ensure I have an adequate understanding to go further into the details of a solution. On a Kerberos list I was asking for a little bit of help, and the answ

Re: OpenLDAP to Kerberos, Take 2

2008-02-29 Thread Russ Allbery
Wes Modes <[EMAIL PROTECTED]> writes: > In general, I am trying to authenticate a login and password received > via an OpenLDAP client (in this case SMB via the smbldap-tools) with the > logins and passwords held in a Kerberos server elsewhere. Is this a > legitimate use of these services? Well,

Re: OpenLDAP to Kerberos, Take 2

2008-02-29 Thread Wes Modes
>> But on an OpenLDAP list I got: >> >> There is an ugly hack: having a userPassword field with >> "{SASL}" in LDAP you can employ saslauthd's >> Kerberos backend. We use it as a crutch for a web application which >> can only authenticate against an LDAP directory >> > > And w

Re: OpenLDAP to Kerberos, Take 2

2008-02-29 Thread Russ Allbery
Wes Modes <[EMAIL PROTECTED]> writes: > Where does one get more info on this ugly hack? > > What you described is precisely what I was hoping for. However, I hoped > it would be commonplace and elegant. But ugly hacks have their place. Good question. It's remarkably absent from the OpenLDAP m

kinit pkinit question.

2008-02-29 Thread Matthew Andrews
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I initially sent this to krbdev, but in retrospect it probably more rightly belongs here. Hello, I am attempting to set up pkinit authentication with the kerberos 1.6.3 code, and havind trouble figuring out what is needed to get the kinit client to u

Re: GSSAPI Key Exchange Patch for OpenSSH 4.7p1

2008-02-29 Thread Matthew Andrews
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hmmm The cascading credentials code sounds interesting, but raises the practical question of how does one deal with derived credentials. For example some sites configure the pam_session code to use delegated krb5 credentials to acquire additional c

Re: GSSAPI Key Exchange Patch for OpenSSH 4.7p1

2008-02-29 Thread Russ Allbery
Matthew Andrews <[EMAIL PROTECTED]> writes: > Hmmm The cascading credentials code sounds interesting, but raises > the practical question of how does one deal with derived credentials. > For example some sites configure the pam_session code to use delegated > krb5 credentials to acquire additi

Re: kinit pkinit question.

2008-02-29 Thread Kevin Coffman
On Fri, Feb 29, 2008 at 5:56 PM, Matthew Andrews <[EMAIL PROTECTED]> wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > I initially sent this to krbdev, but in retrospect it probably more > rightly belongs here. > > > Hello, > > I am attempting to set up pkinit authentication with th

Re: Kerberos V5 refuses authentication because Kerberos checksum verification failed: Bad encryption type

2008-02-29 Thread Victor Sudakov
Victor Sudakov wrote: > What could be the reason that I cannot telnet from FreeBSD to Solaris 10 > with the following error: > Connected to oracle.sibptus.tomsk.ru. > Escape character is '^]'. > [ Trying mutual KERBEROS5 (host/[EMAIL PROTECTED])... ] > [ Kerberos V5 refuses authentication because

Re: kinit pkinit question.

2008-02-29 Thread Matthew Andrews
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 | Matt, | The obvious question is whether your KDC is properly configured for | pkinit? Also, is the client configured to require preauthentication? | If so, the KDC should offer the pkinit preauth method to the client in | a preauth-required message