leash session key type NULL

2006-09-18 Thread Markus Moeller
I am using leash 2.5 and when I import tickets from the MS cache I get for some users a session key type of NULL whereas the ticket encryption type is RC4-HMAC-NT. When I use get tickets with username/password I get the corrrect session key type of RC4-HMAC-NT. Does anybody know why ? I am

RE: leash session key type NULL

2006-09-18 Thread Tim Alsop
You need to set the AllowTGTSessionKey registry setting if you want to see the Session Key etype, otherwise it will be shown as 0. Thanks, Tim -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Markus Moeller Sent: 18 September 2006 14:37 To:

Re: leash session key type NULL

2006-09-18 Thread Jeffrey Altman
Markus Moeller wrote: I am using leash 2.5 and when I import tickets from the MS cache I get for some users a session key type of NULL whereas the ticket encryption type is RC4-HMAC-NT. When I use get tickets with username/password I get the corrrect session key type of RC4-HMAC-NT.

Cross Forest Kerberos Delegation of Authentication

2006-09-18 Thread [EMAIL PROTECTED]
I have a multi-tier applicaiton that resides in the resouce forest where the Webpage in tier 1 needs to use Kerberos Delegation of authentication to connect to an applicaiton server in tier 2 in that same resource forrest. The web identity and the applicaiton identity are both operating as named

Re: Need information about krb5-1.5 release

2006-09-18 Thread Sachin Punadikar
Hello, I got the answer to my first question. KDB abstraction layer feature provides an abstraction layer over the native kerberos database (KDB) so that Kerberos exploiters can choose to store the authentication information in other databases like LDAP. This was basically developed by Novell as

Re: leash session key type NULL

2006-09-18 Thread Markus Moeller
I thought I had the registry setting done, but I didn't. Thanks Markus Jeffrey Altman [EMAIL PROTECTED] wrote in message news:[EMAIL PROTECTED] Markus Moeller wrote: I am using leash 2.5 and when I import tickets from the MS cache I get for some users a session key type of NULL whereas

Slow response with multiple KDCs

2006-09-18 Thread petesea
My Kerberos admins recently changed all the KDCs in our realm and started distributing a new standard krb5.conf file. Now... instead of taking 1 sec to get a password prompt from kinit, it takes 40-50 secs. The old file lists 6 KDCs using IP addresses instead of hostnames. The new file

Re: Kerberos 5 v1.5.1 on AIX 5.2 or AIX 5.3

2006-09-18 Thread Christopher D. Clausen
[EMAIL PROTECTED] wrote: Any one had any success compiling KRB5 1.5.1 on AIX 5.2 or 5.3 ? I am experiencing the same errors as a previous poster; but have not seen any solutions. Configure is successful with the following flags: export CC=cc export CFLAGS='-D_LARGE_FILES -DLANL

Re: Slow response with multiple KDCs

2006-09-18 Thread Ken Raeburn
On Sep 18, 2006, at 17:15, [EMAIL PROTECTED] wrote: My Kerberos admins recently changed all the KDCs in our realm and started distributing a new standard krb5.conf file. Now... instead of taking 1 sec to get a password prompt from kinit, it takes 40-50 secs. The old file lists 6 KDCs

Re: Kerberos 5 v1.5.1 on AIX 5.2 or AIX 5.3

2006-09-18 Thread Ken Raeburn
On Sep 18, 2006, at 17:56, Marcus Watts wrote: [EMAIL PROTECTED] writes: ... making all in util... making all in util/support... cc -I../../include -I./../../include -I. -I. -DKRB5_DEPRECATED=1 -DKRB5_PRIVATE=1 -D_LARGE_FILES -DLA L -DLANL_ICN -qhalt=e -O -D_THREAD_SAFE -c

RE: Kerberos 5 v1.5.1 on AIX 5.2 or AIX 5.3

2006-09-18 Thread Lamar.Saxon
Believe it or not; both solutions seem to work and compilation succeeds ! #define GET_HOST_BY_NAME(NAME, HP, ERR, TMP) \ { \ (HP) = (gethostbyname_r((NAME), TMP.ent, TMP.data)\ ? 0

Re: Kerberos 5 v1.5.1 on AIX 5.2 or AIX 5.3

2006-09-18 Thread Marcus Watts
[EMAIL PROTECTED] writes: Subject: RE: Kerberos 5 v1.5.1 on AIX 5.2 or AIX 5.3 Date: Mon, 18 Sep 2006 21:01:12 -0500 Message-ID: [EMAIL PROTECTED] From: [EMAIL PROTECTED] To: [EMAIL PROTECTED], [EMAIL PROTECTED] Cc: kerberos@mit.edu Believe it or not; both solutions seem to work and