MIT Kerberos 1.12.4 kinit fails in AIX

2016-03-24 Thread Vipul Mehta
Hi, Following are my setup details : => AIX version 6 => MIT Kerberos version 1.12.4 => Windows Server 2008 KDC. Our kerberos authentication API dynamically loads MIT Kerberos and calls its APIs via function pointer. It works fine in Linux.64 and Windows. We have done two file changes for buildi

Kerberos KRB_AP_REQ message - Server name verification required ?

2021-03-19 Thread Vipul Mehta
Hi, Suppose there are two servers A and B running under different kerberos service principals. If both the service principals have same password and kvno then kerberos long term encryption key will be same for both. Seems to be the case for windows KDC. In such case, a client having service ticke

Re: Kerberos KRB_AP_REQ message - Server name verification required ?

2021-03-21 Thread Vipul Mehta
t 10:29 AM Benjamin Kaduk wrote: > On Fri, Mar 19, 2021 at 11:47:49PM +0530, Vipul Mehta wrote: > > Hi, > > > > Suppose there are two servers A and B running under different kerberos > > service principals. > > If both the service principals have same password and

Re: Kerberos KRB_AP_REQ message - Server name verification required ?

2021-03-22 Thread Vipul Mehta
2, 2021 at 11:13 PM Simo Sorce wrote: > Note that this is true only for RC4-HMAC keys, because the RC4-HMAC key > is unsalted. AES keys are salted so two machines will have different > AES keys even if the "password" is the same. > > HTH, > Simo. > > On Mon, 2021-03-22

Version 1.19.1 compilation issue - RedHat Linux

2021-05-12 Thread Vipul Mehta
Hi, I am trying to compiler MIT Kerberos version 1.19.1 in RedHat linux with following gcc: gcc (GCC) 4.4.7 20120313 (Red Hat 4.4.7-4) Getting following error: gic_keytab.c:185: error: ‘etype_list’ may be used uninitialized in this function At top level: cc1: warning: unrecognized command line op

Re: Version 1.19.1 compilation issue - RedHat Linux

2021-05-17 Thread Vipul Mehta
in version 1.19. On Thu, May 13, 2021 at 9:15 PM Robbie Harwood wrote: > Vipul Mehta writes: > > > I am trying to compiler MIT Kerberos version 1.19.1 in RedHat linux with > > following gcc: > > gcc (GCC) 4.4.7 20120313 (Red Hat 4.4.7-4) > > > > What is the vers

Query regarding S4U2Self protocol extension

2021-07-23 Thread Vipul Mehta
Hi, To perform constrained delegation from Service A to Service B, forwardable flag must be set in the S4U2Self service ticket returned by KDC to Service A. I did some testing with Windows KDC and it will set forwardable flag in S4U2Self service ticket in either of the following cases: 1) Trust

Re: Query regarding S4U2Self protocol extension

2021-07-23 Thread Vipul Mehta
/dd1b47f9-580c-4c4e-8f34-4485b9728331 This is proved here: https://shenaniganslabs.io/2019/01/28/Wagging-the-Dog.html#serendipity On Sat, Jul 24, 2021 at 2:08 AM Vipul Mehta wrote: > Hi, > > To perform constrained delegation from Service A to Service B, > forwardable flag must be set in

Re: Query regarding S4U2Self protocol extension

2021-07-27 Thread Vipul Mehta
e, Jul 27, 2021 at 12:44 AM Greg Hudson wrote: > On 7/23/21 4:38 PM, Vipul Mehta wrote: > > I did some testing with Windows KDC and it will set forwardable flag in > > S4U2Self service ticket in either of the following cases: > > > > 1) TrustedToAuthForDelegation is set

Re: Query regarding S4U2Self protocol extension

2021-07-28 Thread Vipul Mehta
check: https://github.com/openjdk/jdk/blob/739769c8fc4b496f08a92225a12d07414537b6c0/src/java.security.jgss/share/classes/sun/security/krb5/internal/CredentialsUtil.java -> line 105 On Wed, Jul 28, 2021 at 2:08 PM Isaac Boukris wrote: > On Wed, Jul 28, 2021 at 11:10 AM Vipul Mehta &

Re: Query regarding S4U2Self protocol extension

2021-07-28 Thread Vipul Mehta
rity update, now I cannot change the forwardable flag from false to true in S42U2Self ticket in case 1). On Tue, Jul 27, 2021 at 9:58 PM Isaac Boukris wrote: > On Tue, Jul 27, 2021 at 6:54 PM Vipul Mehta > wrote: > > > > Need a clarification: > > MIT KDC will set the for

Re: Query regarding S4U2Self protocol extension

2021-07-29 Thread Vipul Mehta
Thank you. This was a useful discussion for me. On Wed, Jul 28, 2021 at 4:36 PM Isaac Boukris wrote: > On Wed, Jul 28, 2021 at 1:46 PM Vipul Mehta > wrote: > > > > Now we know that behavior is unified and S4U2Self ticket should be > forwardable to avoid vulnerability,

Re: Query regarding S4U2Self protocol extension

2021-08-24 Thread Vipul Mehta
;!!KpaPruflFCEp!xs7LC6xF-p5noCT18UnibXxKXcrNUf6GDk_BArh2V7T3TRWFgGLo5IL9RlB1cVwEOw$> Is this implemented in the MIT Kerberos client ? On Thu, Jul 29, 2021 at 2:20 PM Vipul Mehta wrote: > Thank you. > This was a useful discussion for me. > > On Wed, Jul 28, 2021 at 4:36 PM Isaac Boukris wrote: > >> On We

Re: Query regarding S4U2Self protocol extension

2021-08-25 Thread Vipul Mehta
Thanks. This information will be provided to openjdk dev as they were asking about MIT krb5 behavior -> https://bugs.openjdk.java.net/browse/JDK-8272162 On Wed, Aug 25, 2021 at 1:00 PM Isaac Boukris wrote: > Hi Vipul, > > On Wed, Aug 25, 2021 at 6:12 AM Vipul Mehta > wrote: >

Incorrect delegation state shown on acceptor side by context flags

2013-05-17 Thread Vipul Mehta
Hi, It seems there is a bug in MIT kerberos gss source code where the delegation state is set in context flags on acceptor side. I am using a keytab on server side to acquire credentials with in memory credential cache : *cred->usage == GSS_C_BOTH* Client has *delegation flag set to false* but ha

Re: Incorrect delegation state shown on acceptor side by context flags

2013-05-17 Thread Vipul Mehta
So, on acceptor side, how do i know that initiator has delegated the credentials if i can't rely on context delegation flag ? What about the java implementation of GSS ? Looks like there it works fine. On Fri, May 17, 2013 at 7:18 PM, Greg Hudson wrote: > On 05/17/2013 07:33 AM, Vip

Re: Incorrect delegation state shown on acceptor side by context flags

2013-05-17 Thread Vipul Mehta
On Fri, May 17, 2013 at 8:31 PM, Greg Hudson wrote: > The GSSAPI doesn't distinguish between different kinds of credential > delegation. But if you use GSS_C_ACCEPT rather than GSS_C_BOTH acceptor > credentials, then constrained delegation won't be used, and you will be > able to tell whether tr

Re: Incorrect delegation state shown on acceptor side by context flags

2013-05-20 Thread Vipul Mehta
One more question, what is the exact use of context delegation flag if it doesn't need to be same on initiator and acceptor side. On Fri, May 17, 2013 at 9:54 PM, Vipul Mehta wrote: > On Fri, May 17, 2013 at 8:31 PM, Greg Hudson wrote: > >> The GSSAPI doesn't disting

Windows KDC - Delegation Option

2014-02-10 Thread Vipul Mehta
Hi, Scenario : User A forwards his credentials to User B. User B uses the forwarded credentials to interact with User C on behalf of user A. [Delegation] In windows KDC there is delegation option associated with user properties. I've set it to "Do not trust this user for delegation" for User B i.

Re: Windows KDC - Delegation Option

2014-02-11 Thread Vipul Mehta
@Christopher : I know about that option. I don't want to disable delegation but i want to know the correct behaviour of MIT Kerberos with KDC Option i specified. @Greg, now it's clear to me. Checked the code also. So, if initiator has requested GSS_C_DELEG_FLAG, then delegation will always be done

TCP support for MIT Kerberos in HP-UX IA64

2014-04-01 Thread Vipul Mehta
Hi, I am using mit kerberos library build in HP-UX IA64 platform but not able to get credentials from keytab. Username - password case works fine. Same method in my API to get credentials from keytab works fine in library build for other platforms( win32, linux, aix ). On debugging i found tha

Re: TCP support for MIT Kerberos in HP-UX IA64

2014-04-07 Thread Vipul Mehta
x27;ve windows KDC and MIT Kerberos version 1.11.1 On Tue, Apr 1, 2014 at 4:59 PM, Vipul Mehta wrote: > Hi, > > I am using mit kerberos library build in HP-UX IA64 platform but not able > to get credentials from keytab. Username - password case works fine. > > Same method in my

Re: TCP support for MIT Kerberos in HP-UX IA64

2014-04-08 Thread Vipul Mehta
; #endof It works perfectly fine. I tried using hpux macro but didn't work, so i introduced my own HPUX-IA64 macro and defined it via CFLAGS. On Mon, Apr 7, 2014 at 8:37 PM, Greg Hudson wrote: > On 04/07/2014 04:44 AM, Vipul Mehta wrote: > > I've narrowed down the problem. > &

Re: Windows KDC - Delegation Option

2014-04-25 Thread Vipul Mehta
Your understanding is correct but credential delegation requirements are API dependent instead of platform. For Unix : Putty uses MIT Kerberos - GSS API. When you enable delegation in putty it requests GSS_C_DELEG_FLAG instead of GSS_C_DELEG_POLICY_FLAG which doesn't check ok_as_delegate_flag, hen

Re: TCP support for MIT Kerberos in HP-UX IA64

2014-04-26 Thread Vipul Mehta
As everything is working fine with the change, can someone please commit this change to the repository for get_so_error() in sendto_kdc.c #if defined(__hpux) int sockerrlen; #else socklen_t sockerrlen; #endof On Tue, Apr 8, 2014 at 7:55 PM, Vipul Mehta wrote: > Thanks Greg, i figured

Re: Windows KDC - Delegation Option

2014-04-28 Thread Vipul Mehta
simply a > request to tell the KDC that my ticket *has* been forwarded to a remote > system? If so what is the necessity for this notification and response > > Feel free to point me to any specific RFC sections which describe the > specific traffic and ticket issuance I am conf

Re: TCP support for MIT Kerberos in HP-UX IA64

2014-04-28 Thread Vipul Mehta
Yes, it does logs a warning on using socklen_t : "argument of type "socklen_t *" is incompatible with parameter of type "int *". On Mon, Apr 28, 2014 at 7:44 AM, Simo Sorce wrote: > On Sun, 2014-04-27 at 11:47 -0400, Greg Hudson wrote: > > On 04/26/2014 02: