Hi Kaushal,
There are some good notes for Kerberos installation on redhat linux:
http://www.redhat.com/docs/manuals/linux/RHL-7-Manual/ref-guide/s1-kerberos-server.html
You can find the Kerberos libs and other details at:
http://rpmfind.net/linux/rpm2html/search.php?query=krb5-libs
> "petesea" == petesea <[EMAIL PROTECTED]> writes:
petesea> Is there any release date for KFW 3.1? I haven't had
petesea> much chance to test it, but MAY have found a
petesea> bug/enhancement I'd like to submit before it's too late.
There is not a release date yet.
_
Is there any release date for KFW 3.1?
I haven't had much chance to test it, but MAY have found a bug/enhancement
I'd like to submit before it's too late.
Kerberos mailing list Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/ker
Using krb5-1.4.3 on a Redhat system and I get the following error from
kpasswd:
Failed decrypting request
The admin server is accessed via VPN/NAT and from the sparse info I could
find, I suspect that's the issue. DNS does show that my VPN IP matches
the hostname.
Questions...
Is that th
Hello all,
I am implementing a Kerberos/GSSAPI solution in a test environment and I
am experiencing some issues with allowed windows ssh clients to be granted
acess to the ssh server.
The background:
Windows AD is primary kdc with realm name KDCTEST.COM and hostname
adauth.kdctest.com
MIT kdc
Fariba <[EMAIL PROTECTED]> writes:
> Could you elaborate on that?
In order to change the key of a principal, you need administrative access
to the KDC database, either through kadmin.local, the kadmin network
protocol, or something like the password change protocol (which is only
semi-standardize
On Aug 17, 2006, at 12:38, Fariba wrote:
> Could you elaborate on that?
> Ken Raeburn wrote:
>> You'd need some sort of administrator access, either through the
>> kadmin protocol, or the set/change password protocol being worked on
>> in the IETF.
An administrator could change the password with k
Could you elaborate on that?
Ken Raeburn wrote:
> On Aug 17, 2006, at 12:20, Fariba wrote:
>> Thank you and others for replying. If we use the randkey option to
>> create the principal and do not transfer it to the keytab (if you
>> transfer it to the keytab, I assume anyone typing the username
Thank you and others for replying. If we use the randkey option to
create the principal and do not transfer it to the keytab (if you
transfer it to the keytab, I assume anyone typing the username is
authenticated, so it is nor secure), is there a way to set the real
password? Using k_chpass
On Aug 17, 2006, at 12:20, Fariba wrote:
> Thank you and others for replying. If we use the randkey option to
> create the principal and do not transfer it to the keytab (if you
> transfer it to the keytab, I assume anyone typing the username is
> authenticated, so it is nor secure), is ther
(PLEASE don't include kerberos-announce in the recipient list on
queries. It's just more work for us to go delete the messages from
the moderation queue.)
On Aug 17, 2006, at 06:07, ronnie sahlberg wrote:
> a principal witout its associated password would be pointless for
> kerberos since tha
Fariba wrote:
> Is it possible to create a principal without password in kerberos? Thank
> you.
You can create a principal with a random key (password) by using the
-randkey option (i.e. in kadmin, 'addprinc -randkey user'). You can
then extract this to a keytab, and use the keytab to authoris
a principal witout its associated password would be pointless for
kerberos since that account would not be able to use tickets that by
definition are encrypted with a key based on said accounts password.
i.e. no
On 8/17/06, Fariba <[EMAIL PROTECTED]> wrote:
> Is it possible to create a principal
Hi ALL
I am a newbie, I wanted to install kerberos to be installed on the Linux box
is there any step by step guide to install it on Linux Box.
Thanks
Kaushal
Kerberos mailing list Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinf
14 matches
Mail list logo