I was hoping someone might be able to help me fix an issue I have
encountered.
I tested KRB5 1.3.6 on AIX 5.2 using C for AIX and the installed make.
Created a krb5.conf and krb5.keytab to talk to a Windows 2k AD Domain
Controller. Had no issues, connected and received tickets fine.
I recently
How strong is 3DES with MD5 without HMAC or key derivation?
Specifically, is MD5 in this situation much use without HMAC given the
recent attacks found? If not, how easy is it to modify an encrypted 3DES
message so that it contains different content? Is that attack comparable
to cracking the key?
Lamar == [EMAIL PROTECTED] writes:
Lamar I tested KRB5 1.3.6 on AIX 5.2 using C for AIX and the installed make.
Lamar Created a krb5.conf and krb5.keytab to talk to a Windows 2k AD Domain
Lamar Controller. Had no issues, connected and received tickets fine.
Lamar I recently installed KRB5
This is from a chinese student.
I am trying to install Kerberos to do some experiments on the network
authentication protocol.
But,it seems that I have met some problems when I try to install it.I want to
just tell you what I have done.And,if I have done something wrong,please tell
me.thx
Rahul,
I am started testing the IBM native support from z/OS 1.2 upwards. I did
get ftp to work, only RACF didn't want to let me login without a password.
Regards
Markus
[EMAIL PROTECTED] wrote in message
news:[EMAIL PROTECTED]
Does anyone use MIT KRB5 (preferably via GSS-API) on IBM
Hello, and at first I apologize for my ignorance.
I have encountered some problems with my Kerberos 5 configuration.
I'd like to use an AD authentication base on my LINUX server.
Here is my configuration file krb5.conf :
[logging]
default = FILE:/var/log/krb5libs.log
kdc =
Not sure if our model will fit what you mean by with Linux, but we
run a z890 with SuSE and Debian images running under zVM. I have
kerberized my SSH and LDAP servers running there, and we will be moving
the KDCs (at least the master, and one slave) there in the near future.
HTH,
-Matt
Hello Kerberos Gurus,
I am giving a pretty lengthy presentation on Sun Kerberos next week and
I want to make sure I have the correct understanding of how cross-realm
authentication works.
Domain1: EXAMPLE.COM
Domain2: EXAMPLE1.COM
1) The user [EMAIL PROTECTED] wants to telnet to
host/[EMAIL