dictionary password screening problem

2006-09-12 Thread Erich Weiler
Hi All- I'm having this weird issue that I'm hoping someone can shed some light on. I've got a dictionary file of words I want to keep from being used in passwords but I can't seem to get it to work. This is what's in my kdc.conf file: - [kdcdefaults] acl_file = /var/kerberos/krb5kdc/k

Re: Openssh, kerberos and Solaris 10

2006-08-09 Thread Erich Weiler
> You fundamentally misunderstand how network authentication and > credential forwarding work. No, I think I do understand it. All you have written below are steps I have taken and am sorted with. Perhaps I'm not making myself very clear in describing the problem I'm having (which I can certai

Re: Openssh, kerberos and Solaris 10

2006-08-09 Thread Erich Weiler
> With OpenSSH-4.1 at least ssh_gssapi_krb5_storecreds and > ssh_gssapi_krb5_userok make krb5 API calls as gss never had a simple > authz function or a way to save the delegated creds. > > Solaris 10's sshd uses PAM, to do these. OpenSSH should look at that > approach too, then it would not need K

Re: Openssh, kerberos and Solaris 10

2006-08-08 Thread Erich Weiler
Crud, I was hoping you wouldn't say that... :( -erich Will Fiveash wrote: > On Tue, Aug 08, 2006 at 04:49:14PM -0700, Erich Weiler wrote: >> Hi all- >> >> I'm not sure this is the correct place to post about this but I'm >> getting no respon

Openssh, kerberos and Solaris 10

2006-08-08 Thread Erich Weiler
Hi all- I'm not sure this is the correct place to post about this but I'm getting no response over an OpenSSH.org, if there is a more appropriate place to post please let me know... And the people at Sun scream at me for even considering openssh when they supply their own version of SSH which

Re: "last log" and other information tracking

2006-07-28 Thread Erich Weiler
al does not > require preauthentication. In this, case the client does not actually > authenticate itself to the KDC at all: the KDC simply sends out the > encrypted TGT and relies on the fact that only the intended principal > can decrypt it. Hence, I would expect these counte

"last log" and other information tracking

2006-07-27 Thread Erich Weiler
Greetings all! I'm having trouble finding the answer to a problem I'm having... Basically, when I do a "getprinc username" through kadmin, I get: kadmin: getprinc user Principal: [EMAIL PROTECTED] Expiration date: [never] Last password change: Fri Jul 21 16:26:28 PDT 2006 Password expiration da

Kerberos PAM help on Solaris 10

2006-06-30 Thread Erich Weiler
Hi All- I'm hoping some of you Sun Kerberos gurus can tell me if my problem can be resolved... Basically I have my test Solaris 10 system set up to authenticate, via PAM, in 3 ways. First it checks if you have a local account and then let's you in if so. Second it checks to see if you have a K

Re: Kerberized NFSv4 problems

2006-06-19 Thread Erich Weiler
Never mind, it worked! The client just needed a reboot. Thanks again for your help! ciao, erich Erich Weiler wrote: > Hi Kevin, > > Aha, I think, if I'm reading this correctly, the version numbers are > defintely off: > > (on KDC) > % klist -e -k -t /etc/krb5.

Re: Kerberized NFSv4 problems

2006-06-19 Thread Erich Weiler
> Your nfs server's keytab has kvno 5. You need to do the getprinc on > that same principal to see what the key version number is in the KDC. > (Your klist shows principal nfs/[EMAIL PROTECTED], but the > getprinc output is for nfs/[EMAIL PROTECTED]) > > The kvno of the extracted key in the nfs s

Re: Kerberized NFSv4 problems

2006-06-19 Thread Erich Weiler
> Hmm... krb5cc_0 would seem to be root's Kerberos cache. Is NFS just > being explicitly denied for root? Or is root otehrwise treated > differently than normal user accounts? (I use OpenAFS myself, so I > don't really know how this NFSv4 stuff works.) NFS shouldn't be denied for root as far

Re: Kerberized NFSv4 problems

2006-06-19 Thread Erich Weiler
match the key version > displayed by getprinc for the same principal within kadmin. > > K.C. > > > On 6/19/06, Erich Weiler <[EMAIL PROTECTED]> wrote: >> Greetings all, >> >> We're having some problems getting kerberized NFSv4 working in our >>

Re: Kerberized NFSv4 problems

2006-06-19 Thread Erich Weiler
Hi Christopher, > Is there a particular reason you are limiting yourself to DES keys? > (This isn't a problem though, just a question.) No reason really, just using DES keys for testing. Once I get this working I'll move up to better encryption. > I'm pretty sure MYREALM.COM is a default valu

Kerberized NFSv4 problems

2006-06-19 Thread Erich Weiler
Greetings all, We're having some problems getting kerberized NFSv4 working in our environment, was hoping someone would have an idea or two of what's going on. We've set up our KDC (Fedora Core 5 box) and it's working great, people are logging in and getting tickets, all is well there. What I

Re: NFSv4 with sec=krb5 mounts not working under Solaris

2006-05-26 Thread Erich Weiler
We were using MIT krb5 because all of the other platforms on our network (mostly different flavors of linux) were using MIT krb5, so I thought we should use it on the Suns as well just for the sake of homogeneity. Sun's version of LDAP had a very tough time reading our OpenLDAP server so we had

Re: NFSv4 with sec=krb5 mounts not working under Solaris

2006-05-25 Thread Erich Weiler
% exportfs -v /exports/home gss/krb5(rw,wdelay,nohide,insecure,root_squash,no_subtree_check,anonuid=65534,anongid=65534) /exports/boot gss/krb5(rw,wdelay,nohide,insecure,root_squash,no_subtree_check,anonuid=65534,anongid=65534) /exports gss/krb5(rw,wdelay,nohide,insecure,root_squash,no_subtree_c

NFSv4 with sec=krb5 mounts not working under Solaris

2006-05-25 Thread Erich Weiler
Hi All, I've been beating my head against this for a while now and thought I'd post here to see if anyone knows where I'm going wrong. I installed MIT's Kerberos on my Solaris 10 box, using krb5 to authenticate against a Kerberos server running Fedora Core 5. Works great, I can SSH in to my