Does anaybody know how to solve this???

2005-09-20 Thread Operator
Hi, I am using Kerberos 5-1.4.2 on Solaris 9 and Window 2000 as the KDC. I am trying to login automatically login with from the unix host to the same unix host without having to type in a password, i.e. I should be able to use the host principal. However, I get "Not enough room for authenticatio

Re: nfsv4 sec=krb5 + xscreensaver

2005-09-20 Thread Douglas E. Engert
FM wrote: I'm using pam_krb5 include with RedHat enterprise 4. I look inside the README in the source and there is no refresh_creds option. Which pam_krb5 are you using ? Depends on system. On Solaris 10, xsecreensaver calls the SOlaris PAM and refresh works without any extra parameters

Re: nfsv4 sec=krb5 + xscreensaver

2005-09-20 Thread FM
I'm using pam_krb5 include with RedHat enterprise 4. I look inside the README in the source and there is no refresh_creds option. Which pam_krb5 are you using ? Douglas E. Engert wrote: FM wrote: Thanks for your reply, The prob is that xscreensaver (with pam_krb5) authenticate me : Sep 20

Re: nfsv4 sec=krb5 + xscreensaver

2005-09-20 Thread Douglas E. Engert
FM wrote: Thanks for your reply, The prob is that xscreensaver (with pam_krb5) authenticate me : Sep 20 15:26:11 SRV krb5kdc[17590](info): AS_REQ (2 etypes {16 1}) 192.168.4.171(88): ISSUE: authtime 1127244371, etypes {rep=16 tkt=16 ses=16}, [EMAIL PROTECTED] for krbtgt/[EMAIL PROTECTED]

Re: telnetd: Authorization failed. -- [Any kerberos - telnetd setup tutorial ?]

2005-09-20 Thread vj
alright the password issue was solved by kadmin.local but the above ones remain the same Kerberos mailing list Kerberos@mit.edu https://mailman.mit.edu/mailman/listinfo/kerberos

Re: nfsv4 sec=krb5 + xscreensaver

2005-09-20 Thread FM
Thanks for your reply, The prob is that xscreensaver (with pam_krb5) authenticate me : Sep 20 15:26:11 SRV krb5kdc[17590](info): AS_REQ (2 etypes {16 1}) 192.168.4.171(88): ISSUE: authtime 1127244371, etypes {rep=16 tkt=16 ses=16}, [EMAIL PROTECTED] for krbtgt/[EMAIL PROTECTED] but it does no

Re: nfsv4 sec=krb5 + xscreensaver

2005-09-20 Thread Douglas E. Engert
FM wrote: Hello, We are are using MIT krb5 + LDAP on server and pam_krb5 (pam_krb5-2.1.2-1) on clients I'd like to use nfsv4 sec=krb5 for my home users folers. with sec=krb5, the nfs server will check the TGT of the user, the prob is : when you unlock you computer, yout TGT is not creat of

Re: Core Dump with gsstest-1.26 and krb5-1.4.2

2005-09-20 Thread Tom Yu
> "Christoph" == Christoph Weizen <[EMAIL PROTECTED]> writes: Christoph> $ ./gsstest -l /usr/local/lib/libgssapi_krb5.so -d 4 -p out.txt Christoph> Sending verbose output to file "out.txt" Christoph> Segmentation fault (core dumped) Christoph> $ gdb ./gsstest core Christoph> [...] Christoph>

Re: telnetd: Authorization failed. -- [Any kerberos - telnetd setup tutorial ?]

2005-09-20 Thread vj
packet capture error details : KRB5KDC_ERR_S_PRINCIPAL_UNKNOWN sname in all KRB-ERROR AND TGS-REQ is : krbtgt I dont see other service principal other than krbtgt/[EMAIL PROTECTED] - Kerberos mailing list Kerberos@mit.edu https://mailma

Re: inter-Windows 2003/non-Windows Kerberos realm referrals [Re: Single DNS domain for Multiple Kerberos V5 Realms ?]

2005-09-20 Thread Douglas E. Engert
Great, it looks like the netdom trust command is the missing piece. Buck Huppmann wrote: On Fri, Sep 16, 2005 at 09:58:13AM -0500, Douglas E. Engert wrote: But there is: http://www.ietf.org/internet-drafts/draft-ietf-krb-wg-kerberos-referrals-06.txt which allows a client to ask the user's

nfsv4 sec=krb5 + xscreensaver

2005-09-20 Thread FM
Hello, We are are using MIT krb5 + LDAP on server and pam_krb5 (pam_krb5-2.1.2-1) on clients I'd like to use nfsv4 sec=krb5 for my home users folers. with sec=krb5, the nfs server will check the TGT of the user, the prob is : when you unlock you computer, yout TGT is not creat of renew. So user

Re: telnetd: Authorization failed. -- [Any kerberos - telnetd setup tutorial ?]

2005-09-20 Thread Markus Moeller
You have to do add ajay/[EMAIL PROTECTED] to .k5login of user ajay on engr-167.company.com, then a kinit as ajay/[EMAIL PROTECTED] and a telnet -F -l ajay engr-167.company.com 545 Markus "vj" <[EMAIL PROTECTED]> wrote in message news:[EMAIL PROTECTED] > [EMAIL PROTECTED] ajay]$ telnet -F -l

telnetd: Authorization failed. -- [Any kerberos - telnetd setup tutorial ?]

2005-09-20 Thread vj
[EMAIL PROTECTED] ajay]$ telnet -F -l ajay/[EMAIL PROTECTED] engr-167.company.com 545 Trying 192.168.50.167... Connected to engr-167.company.com (192.168.50.167). Escape character is '^]'. telnetd: Authorization failed. Connection closed by foreign host. [EMAIL PROTECTED] ajay]$ klist Ticket cache:

Core Dump with gsstest-1.26 and krb5-1.4.2

2005-09-20 Thread Christoph Weizen
Hi list, I experimentize with kerberos, sncadapt and gsstest to maybe get Single Sign-On work with a Windows Client (SAPGUI) to a Unix/Linux (SAP) Server. So I compiled krb5-1.4.2 (./configure --enable-shared) and gsstest-1.26. kinit and klist works. But when running gsstest I get a core dump.

inter-Windows 2003/non-Windows Kerberos realm referrals [Re: Single DNS domain for Multiple Kerberos V5 Realms ?]

2005-09-20 Thread Buck Huppmann
On Fri, Sep 16, 2005 at 09:58:13AM -0500, Douglas E. Engert wrote: > But there is: > > http://www.ietf.org/internet-drafts/draft-ietf-krb-wg-kerberos-referrals-06.txt > > which allows a client to ask the user's KDC for a service ticket. If the KDC > can't do it, the KDC will refer the client to

ksu and SEAM RFE request

2005-09-20 Thread Rainer.Heilke
Greetings once again, everyone. I'm sorry to bother the whole Kerberos team with this somewhat off-topic request, but I've been asked to pass this on to the mailing list. The newest Solaris 10 SEAM has greatly expanded its MIT Kerberos interoperability, and we would like to move forward with its

Re: Win2k3 SP1 ktpass problem.

2005-09-20 Thread Pitrich, Karl
Hi, here's my (random) notes and how i do windows/MIT key exchange successfully: with recent versions of MIT Kerberos it is not neccessary to specify any special enc-type as it supports MD4 (which is windows default now) i'm also not specifying the ptype flag to ktpass. the principal you specif