Cleared my tickets (had some old ones) and tried it all over again.
I get this ticket in the kerbtray with this format...
krbtgt/[EMAIL PROTECTED]
Client Name [EMAIL PROTECTED]
Service Name krbtgt/[EMAIL PROTECTED]
Target Name krbtgt/[EMAIL PROTECTED]
I can login using the username/password promp
Hello, and thanks in advance for anyone that can help me out here.
In my desperation I believe I've read every Krb5 MIT doc, and source
but I cannot put two and two together to get my answer.
My situation is that I am building a client Kerberos authentication
subsystem for an application that wil
Sensei wrote:
Hi. I don't have luck with SSH and K5/AFS. I'm trying to make a
passwordless ssh trusting the k5 tickets and granting the access to afs
using aklog (pam_openafs_session).
I have these configuration: server with debian stable, ssh 3.6 ---
clients with gentoo ssh 3.9, nothing seems
You can use ethereal a packet sniffer.
http://www.ethereal.com/
But that is not your problem, from your error messages Apache it is sending
the header fine. The problem occurs later when the web server is trying to
process the token sent from the browser.
gss_accept_sec_context() failed: Miscell
As of right now, this is what our Apache server is saying in the logs...
kerb_authenticate_user entered with user (NULL) and auth_type Kerberos
kerb_authenticate_user entered with user (NULL) and auth_type Kerberos
Acquiring creds for HTTP/[EMAIL PROTECTED]
Verifying client data using KRB5 GSS-API
Hi Wyllys:
Thanks very much for the response. Below please find my response. Thanks in advance
for the help.
>>>You wrote<<<
It sounds like your server process does not have access to its credentials.
Is the server running with permission
Hi. I don't have luck with SSH and K5/AFS. I'm trying to make a
passwordless ssh trusting the k5 tickets and granting the access to afs
using aklog (pam_openafs_session).
I have these configuration: server with debian stable, ssh 3.6 ---
clients with gentoo ssh 3.9, nothing seems to work proper
Fedora Core 2 running Apache 2.0.50 using mod_auth_kerb-rc6.
Setup Kerberos and made principals for the system and for Apache.
Login (pam) access using Kerberos is working great. No problem.
kinit works and authenticates against the ADS. No problem there.
When my browser hits the Apache server,
Bingo!
I "just fixed it" on my test machines, but left it out of the setup
procedure that I gave to the V&V folk.
On Aug 25, 2004, at 6:22 AM, Kevin Coffman wrote:
One of my tester's Solaris 8 Kerberos clients is sending Kerberos 4
requests (req's on port 750 anyway). Another solaris 8 machine
Ahluwalia, Ish wrote:
Hi All:
I'm a newbie to Kerberos world and this is my first time using GSS-API ever. I'm
trying to use GSS-API on Solaris 9 platform. From what I have read so far, it seems
like there is no need to install the MIT version of Kerberos on Solaris since SUN is
fully compatib
> One of my tester's Solaris 8 Kerberos clients is sending Kerberos 4
> requests (req's on port 750 anyway). Another solaris 8 machine is
> doing port 88 requests.
>
> Any suggestions why?
Is /etc/services different on the two machines?
Kerb
11 matches
Mail list logo