Re: preauth mechanism functioning at the client-side

2007-08-16 Thread Gopal Paliwal
and other ones. could you let me know what is happeing why type -2 is not being processed. -gopal On 8/13/07, Marcus Watts [EMAIL PROTECTED] wrote: Date:Mon, 13 Aug 2007 12:01:13 PDT To: Marcus Watts [EMAIL PROTECTED] cc: kerberos@mit.edu, [EMAIL PROTECTED] From:Gopal

Re: kinit(v5): Cannot contact any KDC for requested ...

2007-08-13 Thread Gopal Paliwal
Hi Chittaranjan, I was also having the same problem in the initial stages of kerberos set-up. It seems client-machine(where u r running kinit) is unable to find kdc server. THis is mostly due to the improper DNS set-up if u have done a DNS set-up. Else look for the proper entries in your

Re: preauth mechanism functioning at the client-side

2007-08-13 Thread Gopal Paliwal
and just send type-32 instead of it. let me know. -gopal On 8/13/07, Marcus Watts [EMAIL PROTECTED] wrote: Date:Mon, 13 Aug 2007 10:57:59 PDT To: Tim Alsop [EMAIL PROTECTED], [EMAIL PROTECTED] cc: [EMAIL PROTECTED] From:Gopal Paliwal [EMAIL PROTECTED] Subject: Re

Adding of name-value pair in PADATA field of KRB5_AS_REQ

2007-08-02 Thread Gopal Paliwal
Hi, I wish to perform different types of preauth-mechanism for different users. THe implementation will be such that, some users will be authenticated through the normal password encrypted timestamp, some users will be authenticated through the OTP based mechanism whereas some users will require

Implementing OTP mechanism with existing kerberos

2007-07-25 Thread Gopal Paliwal
Hi, I am implementing OTP mechanism in the existing kerberos. I have set up pre-auth mechanism to authenticate the clients. Now, the user will be asked password+OTP instead of just password. i will be generating this OTP with a hardware token. Also, i will be encrypting time-stamp with password

Re: Implementing OTP mechanism with existing kerberos

2007-07-25 Thread Gopal Paliwal
] On Behalf Of Gopal Paliwal Sent: 25 July 2007 21:31 To: kerberos@mit.edu Subject: Implementing OTP mechanism with existing kerberos Hi, I am implementing OTP mechanism in the existing kerberos. I have set up pre-auth mechanism to authenticate the clients. Now, the user will be asked password

Preauth mechanism provision in MIT kerberos

2007-07-18 Thread Gopal Paliwal
types both its username and password for kinit command. Could any one tell me how do I activate this preauth mechanism in my kerberos if my above assumption is on the correct track. And also point out the files I need to change to activate this mechanism. Thanks in advance. Regards, Gopal Paliwal

Re: Preauth mechanism provision in MIT kerberos

2007-07-18 Thread Gopal Paliwal
Hi, The solution you guys provided help me. Though I now observe following things on ethereal. 1)for the first time krb5_AS_REQ goes whenever user enters his username. 2) Authentication server responds back by giving error as PRE_AUTH REQUIRED 3) Now new krb5_AS_REQ request gets formed with

tracking user activities in kerberos

2007-06-22 Thread Gopal Paliwal
user behaviour. Response will be highly appreciated. Thanks, Gopal Paliwal Kerberos mailing list Kerberos@mit.edu https://mailman.mit.edu/mailman/listinfo/kerberos

DNS set up for installing KDC

2007-06-01 Thread Gopal Paliwal
Hi, We need to set up our own DNS server where our domain would be like mydomain.com. Our unix machine name should become galaxy.mydomain.com where galaxy is the hostname. This unix machine should be able to resolve names for the services like a.mydomain.com or b.mydomain.com running on this