Re: Kerberos Digest, Vol 28, Issue 32

2005-04-26 Thread Ken Raeburn
On Apr 26, 2005, at 18:12, <[EMAIL PROTECTED]> wrote: Tried the suggestions below ( changes to dnsglue.c ) First option compiled; but gave the same errors locating KDC. Okay, so it sounds like there's something wrong in addition to the overrun. Second option would not compile. Lots of errors. We

RE: Kerberos Digest, Vol 28, Issue 32

2005-04-26 Thread Lamar.Saxon
Tried the suggestions below ( changes to dnsglue.c ) First option compiled; but gave the same errors locating KDC. Second option would not compile. Lots of errors. Thanks, Lamar -- Date: Tue, 26 Apr 2005 16:36:26 -0400 From: Ken Raeburn <[EMAIL PROTECTED]> To: Mil

Re: AD Cross Realm Trust Integration

2005-04-26 Thread Jeffrey Altman
John Harris wrote: > Greetings, > > We're currently looking at increasing the session and ticket encryption > types for our Unix-based Kerberos clients (command-line and GSSAPI-based > client/web clients) up to AES. > > One of our issues is to continue to support the cross-realm authentication >

Re: KRB5 1.4 vs. KRB5 1.3.6 on AIX 5.2 (fwd)

2005-04-26 Thread Ken Raeburn
On Apr 26, 2005, at 13:40, Milton Turley wrote: I have done some research on this problem. The host resolve code does not complete successfully. I have traced the error to the routine at /kerberos/mit/krb5-1.4/src/lib/krb5/os/dnsglue.c. In the routine a call is made to res_ninit to provide dn

SPNEGO Kerberos proxy problem

2005-04-26 Thread Maltbia, Marcus
I recently ran into the following problem of trying to proxy SPNEGO Kerberos through an SSL VPN appliance. As you've stated below it does not work. First is there any documentation as to what the fundamental problem statement is? Secondly are there any known work arounds or hacks for this is

KRB5 1.4 vs. KRB5 1.3.6 on AIX 5.2 (fwd)

2005-04-26 Thread Milton Turley
I have done some research on this problem. The host resolve code does not complete successfully. I have traced the error to the routine at /kerberos/mit/krb5-1.4/src/lib/krb5/os/dnsglue.c. In the routine a call is made to res_ninit to provide dns information for the kdc. res_ninit updates t

RE: KRB5 1.4 vs. KRB5 1.3.6 on AIX 5.2

2005-04-26 Thread Lamar.Saxon
Downloaded KRB5 1.4.1 and the installation worked great with GCC and AIX make. None of the problems that were encountered with 1.4.0 and the unbalanced "(". The problem with: /usr/local/kerberos/bin/kinit -V kinit(v5): Cannot resolve network address for KDC in requested realm while getting init

AD Cross Realm Trust Integration

2005-04-26 Thread John Harris
Greetings, We're currently looking at increasing the session and ticket encryption types for our Unix-based Kerberos clients (command-line and GSSAPI-based client/web clients) up to AES. One of our issues is to continue to support the cross-realm authentication with Windows KDCs on campus. As fa

CITI UMich Patches

2005-04-26 Thread John Harris
Greetings, Another integration question...UMich's CITI Group had incremental propagation and cross-realm authentication patches for older versions of MIT Kerberos. Were these integrated into the MIT release as of 1.4+, and if not, does anyone know if they still work? John Harris Campus Data Cent

Increasing default ticket lifetime

2005-04-26 Thread Jan Schumacher
Hi everyone, after having changed the allowable maximum lifetimes in the principal db, I can use kinit with options to ask for tickets valid longer than the default 10h. However, I have not found a way to change this default for pam-krb5, i.e. how to get a longer ticket from login. I tried to chan