configure Kerberos client to always send (timestamp)

swbell kerygma2 at swbell.net
Mon Feb 3 12:49:00 EST 2003


This is the minimum code to keep Active Directory from putting Failure Audit
stuff in the event long:

    krb5_preauthtype    preauth[] = { KRB5_PADATA_ENC_TIMESTAMP };
    krb5_enctype        etypes[] = {ENCTYPE_DES_CBC_MD5};
    memset( outOptions, 0, sizeof(*outOptions) );
    krb5_get_init_creds_opt_init(outOptions);
    krb5_get_init_creds_opt_set_address_list(outOptions, NULL);
    krb5_get_init_creds_opt_set_etype_list( outOptions, etypes,
sizeof(etypes)/sizeof(krb5_enctype) );
    krb5_get_init_creds_opt_set_preauth_list(outOptions, preauth,
sizeof(preauth)/sizeof(krb5_preauthtype) );



in article BA63EBE9.9F84%kerygma2 at swbell.net, swbell at kerygma2 at swbell.net
wrote on 2/3/03 9:50 AM:

> I assume the API that allows this is
>   krb5_get_init_creds_password,
> And the associated krb5_get_init_creds_opt_set_preauth_list.
> 
> Where is there documentation on putting stuff in the preauth list?
> 
> My Active Directory domain controller (Windows 2003) wants three preauth
> types (debug output below):
> 
> salt len=-1; preauth data types: 11 2 15
> etype info 0: etype 3 salt len=17 'KERYGMA.ORGnelson>\xef\xbf\xbd9'
> etype info 1: etype 1 salt len=17 'KERYGMA.ORGnelson'
> 
> It looks like you could always guess that the salt is the realm with the
> username concatenated.
> 
> These correspond to
>   KRB5_PADATA_ETYPE_INFO, KRB5_PADATA_ENC_TIMESTAMP, and 15 is not
> documented (??)
> 
> Anyone know about PADATA type 15?
> 
> in article 87d6m9xwqb.fsf at luminous.mit.edu, Sam Hartman at hartmans at mit.edu
> wrote on 2/3/03 8:28 AM:
> 
>>>>>>> "Wood," == Wood, Justin S <Justin.S.Wood at team.telstra.com> writes:
>>   Wood,> Perhaps I've missed the point, but should it not be
>>   Wood,> possible to configure the client to always send preauth,
>>   Wood,> and hence remove the initial redundant protocol
>>   Wood,> interaction?
>> 
>> I believe that current APIs allow this, but kinit does not currently
>> implement that feature.
>> 
>> In future, it will be less useful as the client will need more
>> information from the KDC to make a correct guess about what preauth or
>> encryption types to use.
>> 
>> So you should not expect to see anyone actually exposing this support
>> in kinit.
>> 
>> ________________________________________________
>> Kerberos mailing list           Kerberos at mit.edu
>> https://mailman.mit.edu/mailman/listinfo/kerberos
>> 
> 
> 




More information about the Kerberos mailing list