stead of the heimdal ones?
(also please specify how to detect the precence of mit kerberos, how to find
out what to set -I and -L and -l to in the makefile so that automake
can detect and automagically generate proper makefiles)
best regards
ronnie sahlberg
decrypt.tar.gz.tar
Descr
http://www.ietf.org/internet-drafts/draft-ietf-krb-wg-kerberos-referrals-03.txt
- Original Message -
From: "Lara Adianto" <[EMAIL PROTECTED]>
To: "Kevin Coffman" <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>
Cc: <[EMAIL PROTECTED]>
Sent: Saturday, April 10, 2004 3:33 PM
Subject: Re: Cross Rea
- Original Message -
From: "Lara Adianto"
Sent: Monday, April 12, 2004 11:09 AM
Subject: Re: Cross Realm Auth: how to resolve the issue of finding the
'Correct' realm of service for ms w2k client...
> I have actually read that internet draft before, but I
> couldn't find the answer to m
iterates over every single secret key in it and tries to decrypt
the blob.
If the decryption was successful, it writes it out again to a file.
any takers?
best regards
ronnie sahlberg
#include
#include
#include
#include
#include
#include
#include
#include
static void
readfile(const
I do not think that is correct.
I am certain that they will use kerberoshowever it is in my
opinion very likely that they will change their kerberos
infrastructure to rely significantly on
digital certificates and the new pkinit draft/standard instead of user
passwords and preauthentication.
List,
I would suggest just documenting the 5 2 format of keytab files properly and
make it the "official" file format for now.
I can put a wiki page up on wiki.ethereal.com that documents the format.
The file format is used by various tools ans products already and all have
basically had to rever
a principal witout its associated password would be pointless for
kerberos since that account would not be able to use tickets that by
definition are encrypted with a key based on said accounts password.
i.e. no
On 8/17/06, Fariba <[EMAIL PROTECTED]> wrote:
> Is it possible to create a principal
r i implemented the packetcable changes in ws) that linked to a
full set of official specification for packetcable and in particular
their krb5 implementation.
This was in the days when wireshark was called ethereal.
regards
ronnie sahlberg
On Thu, Jan 15, 2009 at 7:08 PM, Aleem AKHTAR wr
packet containing the ticket as payloadand that feed that into
wireshark.
This is done using the editcap tool that comes with wireshark but it
requires knowledge about how to build fake ip and udp headers to
prepend to the ticket data, so it is not exactly trivial :-(
regards
ronnie sahlberg
Kerberos mailing list Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos
On Tue, Sep 30, 2014 at 9:17 AM, Wendy Lin wrote:
> On 30 September 2014 17:55, ronnie sahlberg wrote:
>> On Tue, Sep 30, 2014 at 8:25 AM, Wendy Lin wrote:
>>> On 30 September 2014 15:25, Rick van Rein wrote:
>>>> Hi,
>>>>
>>>>>>>
On Tue, Sep 30, 2014 at 11:56 AM, Wendy Lin wrote:
> On 30 September 2014 18:32, ronnie sahlberg wrote:
>> On Tue, Sep 30, 2014 at 9:17 AM, Wendy Lin wrote:
>>> On 30 September 2014 17:55, ronnie sahlberg
>>> wrote:
>>>> On Tue, Sep 30, 2014 at 8:25 AM,
On Thu, 11 Apr 2024 at 16:43, Philippe de Rochambeau wrote:
>
> Hello,
>
> Let's say a user has the following rights on HDFS (which are constrained
> Apache Ranger):
>
> /prd/a/b/c <- read right
> /prd/a/b/d <- read/write right
>
> I would like to get a broad picture of his/her complete access r
.
regards
ronnie sahlberg
On Fri, Sep 17, 2010 at 9:28 PM, Bram Cymet wrote:
> Hi,
>
> What would be the implications if my KDC was compromised and an attacker
> got a hold of the KDB or in my case the LDAP directory storing principal
> information?
>
> As far as I have b
13 matches
Mail list logo