-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
The MIT Kerberos Team announces the availability of MIT Kerberos 5
Release 1.6.1. Please see below for a list of some major changes
included, or consult the README file in the source tree for a more
detailed list of significant changes.
RETRIEVING KE
Rohit Kumar Mehta <[EMAIL PROTECTED]> writes:
> On my client (also running the same version of Ubuntu with libpam_krb5),
> I configured ssh for gssapi, and installed the keytab with the principal
> "host/[EMAIL PROTECTED]". I was able to "kinit [EMAIL PROTECTED]" and
> ssh to cselin12.REALM1 and
Rohit Kumar Mehta wrote:
> Hi guys, I have a pretty basic question about how cross-realm
> authentication works with ssh. Can kerberized logins work when your TGT
> is not from the default realm (as specified by /etc/krb5.conf)
>
> I set up 2 MIT KDCs using Ubuntu server (dapper) each in a di
Hi guys, I have a pretty basic question about how cross-realm
authentication works with ssh. Can kerberized logins work when your TGT
is not from the default realm (as specified by /etc/krb5.conf)
I set up 2 MIT KDCs using Ubuntu server (dapper) each in a different
realm (say REALM1 and REALM
On Fri, 20 Apr 2007 20:16:51 +0530
"neha" <[EMAIL PROTECTED]> wrote:
> Hi,
>
> I have created the webserver account and have used Use DES Encryption as
> checked.
Note that if you check 'Use DES Encryption' you need to then set the
password and regenerate the keytab file. I'm sure you know this
Hi,
I have created the webserver account and have used Use DES Encryption as
checked.
Still facing the following probelm :-
SSException: Failure unspecified at GSS-API level (Mechanism level: Invalid arg
ument (400) - Cannot find key of appropriate type to decrypt AP REP - RC4 with H
MAC)