Getting two service principals, one of them with an empty realm

2010-06-02 Thread Rahul Amaram
Hi, I am strangely getting two service principals for every service I use and one of them has an empty realm. Below is a sample output. $ klist Ticket cache: FILE:/tmp/krb5cc_1001_Xc3DVv Default principal: xxx...@synovel.com Valid starting ExpiresService principal 06/02/10

KRB5KRB_AP_ERR_MODIFIED: MIT Kerberos 1.8.1 arcfour-hmac-md5 session key

2010-06-02 Thread Richard E. Silverman
After upgrading to MIT Kerberos 1.8.1, I get KRB5KRB_AP_ERR_MODIFIED while trying to authenticate to certain devices; so far, a NetApp filer, and Windows hosts running BitVise WinSSHD and MS SQL Server (alll part of a Windows AD realm). Clients are OpenSSH, Samba, and FreeTDS on Solaris. The

Any way to propagate db

2010-06-02 Thread Techie
Hello, Is there a way to propagate the Active Directory Kerberos principals and their passwords to an MIT KDC? I would think that it may not be that simple but have to ask. Thank you Kerberos mailing list Kerberos@mit.edu

RE: Any way to propagate db

2010-06-02 Thread Wilper, Ross A
You could do this with a password change notification DLL on the AD domain controllers. There are some DLLs around that already do this. Of course, you can only propagate when a password is changed. -Ross -Original Message- From: kerberos-boun...@mit.edu

OpenSSH GSSAPI gives Cannot find ticket for requested realm

2010-06-02 Thread Peter Waller
This setup used to work until I recently upgraded my Ubuntu installation from 9.10 to 10.04. I don't understand what has changed, or what could give the following error. I am using the same /etc/krb5.conf. debug1: Next authentication method: gssapi-with-mic debug1: Unspecified GSS failure.

Re: OpenSSH GSSAPI gives Cannot find ticket for requested realm

2010-06-02 Thread Simon Wilkinson
Karmic 9.10: OpenSSH 5.1p1-6ubuntu2, libgssapi-krb5-2 1.7dfsg~beta3-1ubuntu0.6 Lucid 10.04: OpenSSH 5.3p1-3ubuntu3, libgssapi-krb5-2 1.8.1+dfsg-2 This particular version change makes me suspect something related to DES tickets. Does the service ticket you're trying to obtain have

Re: Any way to propagate db

2010-06-02 Thread Techie
Ok, thank you for the information. I was hoping there was a way to do something similar to a kprop from AD to an MIT KDC using some kind of AD tool. But I also imagined that would not be the case since there are likely many incompatibilities. I think I need to read up on the Microsoft Kerberos

Re: Any way to propagate db

2010-06-02 Thread Simo Sorce
On Wed, 2 Jun 2010 10:35:05 -0700 Wilper, Ross A rwil...@stanford.edu wrote: That is true.. I oversimplified a bit. This would allow you to have a KDC with equivalent principals. You would need a trust relationship and the external principal names set on the AD users as alternate security

Re: Any way to propagate db

2010-06-02 Thread Russ Allbery
Simo Sorce sso...@redhat.com writes: Wilper, Ross A rwil...@stanford.edu wrote: That is true.. I oversimplified a bit. This would allow you to have a KDC with equivalent principals. You would need a trust relationship and the external principal names set on the AD users as alternate security

Re: Any way to propagate db

2010-06-02 Thread Techie
On Wed, Jun 2, 2010 at 11:17 AM, Russ Allbery r...@stanford.edu wrote: Simo Sorce sso...@redhat.com writes: Wilper, Ross A rwil...@stanford.edu wrote: That is true.. I oversimplified a bit. This would allow you to have a KDC with equivalent principals. You would need a trust relationship and

Re: Any way to propagate db

2010-06-02 Thread Simo Sorce
On Wed, 02 Jun 2010 11:17:10 -0700 Russ Allbery r...@stanford.edu wrote: Simo Sorce sso...@redhat.com writes: Wilper, Ross A rwil...@stanford.edu wrote: That is true.. I oversimplified a bit. This would allow you to have a KDC with equivalent principals. You would need a trust

Re: Any way to propagate db

2010-06-02 Thread Russ Allbery
Simo Sorce sso...@redhat.com writes: Russ Allbery r...@stanford.edu wrote: Given that we do this routinely at Stanford using cross-realm trust exactly as Ross describes, I think you've misunderstood something. I believe AD adds the PAC for you when you do what Ross says and configure the

Re: Any way to propagate db

2010-06-02 Thread Christopher D. Clausen
Russ Allbery r...@stanford.edu wrote: Simo Sorce sso...@redhat.com writes: Ah sorry, I thought he wanted to use them as completely alternative users. If you do map each MIT principal to an existing Windows user then it does work, although it seem to make sense only as a transition tool to me.

Re: Any way to propagate db

2010-06-02 Thread Russ Allbery
Christopher D. Clausen cclau...@acm.org writes: I advocate just using the Active Directory realm. It is much, much simpler to troubleshoot when there is no cross-realm invovled, especially when different groups operate the different realms. Other than some solvable issues of generating

misc. broken source repository stuff

2010-06-02 Thread Richard E. Silverman
The link to ViewCVS on this page is broken: http://web.mit.edu/kerberos/dist/testing.html#svn And at least several History links in the OpenGrok viewer are also broken, e.g. here: http://src.mit.edu/krb5/xref/branches/krb5-1-8/src/lib/crypto/krb/arcfour/arcfour.c -- Richard Silverman

Re: KRB5KRB_AP_ERR_MODIFIED: MIT Kerberos 1.8.1 arcfour-hmac-md5 session key

2010-06-02 Thread Greg Hudson
On Wed, 2010-06-02 at 03:33 -0400, Richard E. Silverman wrote: After upgrading to MIT Kerberos 1.8.1, I get KRB5KRB_AP_ERR_MODIFIED while trying to authenticate to certain devices; so far, a NetApp filer, and Windows hosts running BitVise WinSSHD and MS SQL Server (alll part of a Windows AD

Re: misc. broken source repository stuff

2010-06-02 Thread Tom Yu
Richard E. Silverman r...@qoxp.net writes: The link to ViewCVS on this page is broken: http://web.mit.edu/kerberos/dist/testing.html#svn Thanks. It should point to the right place now. And at least several History links in the OpenGrok viewer are also broken, e.g. here:

GSSAPIDelegateCredentials only works for REQUIRES_PRE_AUTH principals?

2010-06-02 Thread Adam Megacz
I find that OpenSSH (5.1p1 on both sides) will silently refuse to delegate credentials if the principal being delegated lacks the REQUIRES_PRE_AUTH attribute. Adding that attribute at the KDC and re-issuing the principal's tickets causes everything to work perfectly. Is this behavior

Re: GSSAPIDelegateCredentials only works for REQUIRES_PRE_AUTH principals?

2010-06-02 Thread Russ Allbery
Adam Megacz meg...@cs.berkeley.edu writes: I find that OpenSSH (5.1p1 on both sides) will silently refuse to delegate credentials if the principal being delegated lacks the REQUIRES_PRE_AUTH attribute. Adding that attribute at the KDC and re-issuing the principal's tickets causes everything

Re: KRB5KRB_AP_ERR_MODIFIED: MIT Kerberos 1.8.1 arcfour-hmac-md5 session key

2010-06-02 Thread Richard Silverman
On Wed, 2 Jun 2010, Greg Hudson wrote: On Wed, 2010-06-02 at 03:33 -0400, Richard E. Silverman wrote: After upgrading to MIT Kerberos 1.8.1, I get KRB5KRB_AP_ERR_MODIFIED while trying to authenticate to certain devices; so far, a NetApp filer, and Windows hosts running BitVise WinSSHD and MS