Kerberos/SASL/LDAP/Windows - Message Stream Modified

2006-10-03 Thread degnan78
Hi folks, I'm trying to implement a SSO solution so that my Unix systems can authenticate off my Windows Server 2003 R2 domain controllers. I liked this approach because it's secure, doesn't necessarily need the extra overhead of SSL/TLS, and I don't have to put a bind user's password in the

Kinit failed: Clients credentials have been revoked

2006-10-03 Thread Norbert Wegener
My question concerns as well samba as kerberos. Therefore I also ask it here: With my linux server I have joined an AD domain the usual way kinit [EMAIL PROTECTED] and net ads join -U [EMAIL PROTECTED] wbinfo -m lists the trusted domains. So far so good. Unfortunately every few minutes I get

kerberos password requirements

2006-10-03 Thread Ryan Schultz
Hi, Currently the password requirements for kerberos is 10 characters using 2 of 5 classes (lower, upper, numeric, punctuation, other). Could someone point me to why/how this criteria came about and tell me if this will remain the requirements in the future. Thanks. Ryan Schultz

Re: kerberos password requirements

2006-10-03 Thread Russ Allbery
Ryan Schultz [EMAIL PROTECTED] writes: Hi, Currently the password requirements for kerberos is 10 characters using 2 of 5 classes (lower, upper, numeric, punctuation, other). Could someone point me to why/how this criteria came about and tell me if this will remain the requirements

Re: kerberos password requirements

2006-10-03 Thread Jeffrey Hutzelman
On Monday, October 02, 2006 02:08:59 PM -0500 Ryan Schultz [EMAIL PROTECTED] wrote: Currently the password requirements for kerberos is 10 characters using 2 of 5 classes (lower, upper, numeric, punctuation, other). Could someone point me to why/how this criteria came about and