Regarding use of word "Kerberos" in commercial product

2014-11-05 Thread Manish Gupta
Dear MIT team, We want to use word "Kerberos" in our product name. e.g. OTP-Plugin, Kerberos-Plugin. Can we use "kerberos" word like this in commercial name of a software module? I read Kerberos is registered trademark of MIT, and we need to take permission for using it for commercial purpose,

Regarding KDC proxy test with Windows Server 2012 KDC proxy

2015-02-19 Thread Manish Gupta
Hi, I am trying Kerberos 5-1.13.1 on Ubutu to test KDC proxy feature. I made Windows Server 2012 AD as a KDC proxy. When I do KINIT from Linux client to Windows Server 2012 KDC proxy. I can see from wireshark that client initiated a SSL connection, client hello and server hello is successful, th

Regarding Thread safety of Kerberos libraries

2013-01-16 Thread Manish Gupta
Hi I am porting krb5 to android, please let me know kerberos libraries provided by MIT, as thread safe or not, I read threads.txt file with Kerberos code, but it looks like some operations are thread safe and some not. Please let me know overall, is it advisable to use in an multithread kind of en

Re: HTTP binding of Kerberos GSS API - Behaviour with Mutual Auth

2013-11-14 Thread Manish Gupta
Hi Greg, We are developing a HTTP client which uses Kerberos, we are calling init_sec_context just once, no while loop around it and output token generated by this call is always accepted by server, and server returns 200 OK with response. but we read that some time multi-leg Kerberos can ask fro

Re: Kerberos Explained topic

2013-11-18 Thread Manish Gupta
Dear Ali, You cannot see password file in Window Active Directory, you can use wireshark tool to capture protocol packets Regards, Manish On Mon, Nov 18, 2013 at 6:59 PM, Ali Mohamed wrote: > Dear Sir/ Madam > > > I'm a student in the university of Portsmouth, doing and essay > about Kerberos

Regarding long term TGT

2014-06-13 Thread Manish Gupta
Hi, kerberos implementation in my platform take cares of secure storage of kerberos credential cache. it is protected from any unauthorized access. In this case is there any harm in using long term TGT, like TGT valid for a month? I cannot understand how it can be exploited if TGT is long term.