Use of NT-ENTERPRISE name type via GSS-API

2014-07-02 Thread Alan Braggins
I'm using Kerberos constrained delegation (s4u2proxy) for a proxy server that is authenticating clients to a Microsoft Active Domain server. I'm using GSS-API because I want to end up with a SPNEGO Authorization header, and SPNEGO is a GSS-API mechanism. The user (client) principals I have to wor

Re: What happened to PKCROSS?

2014-07-02 Thread Rick van Rein
Hi Nico, > But mainly the appeal of this approach is that the pieces needed all exist. Are you talking of http://www.citi.umich.edu/projects/kerb_pki/ as your kx509 implementation? It appears to be based on Kerberos4… -Rick Kerberos mailing list

NFSv4 cross-realm support

2014-07-02 Thread Jaap
Hi folks, Recently I've been working on cross-realm support to give my own realm, UMRK.NL, access to the services of a realm that I manage. All systems involved run Debian wheezy. So far, SSH, OpenLDAP, OpenAFS and Dovecot IMAP are all working properly this way, but NFSv4 with sec=krb5i is not;

Re: What happened to PKCROSS?

2014-07-02 Thread Nico Williams
On Wed, Jul 2, 2014 at 6:23 AM, Rick van Rein wrote: > Hi Nico, > >> But mainly the appeal of this approach is that the pieces needed all exist. > > Are you talking of http://www.citi.umich.edu/projects/kerb_pki/ as your kx509 > implementation? It appears to be based on Kerberos4… No. Heimdal

Feedback on KfW 4.0.1 Ticket Manager app

2014-07-02 Thread Dave Botsch
Hi. After with some discussion with folk in the #openafs irc channel, I wanted to send you some feedback on KfW 4.0.1 and the Ticket Manager app. Our environment is Windows 7 attached to a domain. With profiles/etc living on the OpenAFS filesystem (currently at Openafs for Windows 1.7.29). Thing

Re: What happened to PKCROSS?

2014-07-02 Thread Nico Williams
BTW, DANE stapling is not that hard. I have been pointed at AGL's code for it. The RP side doesn't need a DNSSEC resolver to implement it because all the records are stapled, and the RP doesn't need to implement non-existence checking and so on -- just validate the signature chain to the RP's DNS

Re: is the master key cached somehow (slave side)?

2014-07-02 Thread Benjamin Kaduk
On Wed, 25 Jun 2014, Giuseppe Mazza wrote: > Is it the normal behaviour? > I thought you should have a valid stash file on place to access the > database on the slave. Maybe not? > Or there is some kind of caching? > Do you know how it works? The master key is ~only used to encrypt the long-term

remctl 3.9 released

2014-07-02 Thread Russ Allbery
I'm pleased to announce release 3.9 of remctl. remctl is a client/server application that supports remote execution of specific commands, using Kerberos GSS-API for authentication. Authorization is controlled by a configuration file and ACL files and can be set separately for each command, unlike

Re: What happened to PKCROSS?

2014-07-02 Thread Jeffrey Altman
On 7/2/2014 12:11 PM, Nico Williams wrote: > No. Heimdal has a kx509 server and client. And there are other > implementations: > > https://secure-endpoints.com/kcacred/index.html That is the link to the Network Identity Manager provider. The Active Directory Service implementation is here h

Re: Feedback on KfW 4.0.1 Ticket Manager app

2014-07-02 Thread Jeffrey Altman
On 7/2/2014 1:03 PM, Dave Botsch wrote: > Also, being able to auto obtain afs tokens as a side effect of getting > kerberos tickets would be really useful. Users have a hard time > distinguishing Kerberos Tickets from AFS Tokens, and so users need one > app that does both at the click of a single b

Re: Proposition for new remctl ACL scheme / group support

2014-07-02 Thread Russ Allbery
Remi Ferrand writes: > No problem at all, feel free to change the ACL scheme name. From my > point of view "unixgroup" is more suited in this very case as > "localgroup" could be confusing for people that would like to use some > other "groups" backends (non local ones) also supported by libnss