GSS API and impersonate client in the server
Mattias Karlsson
mattias.karlsson at sungard.com
Tue Nov 2 02:54:46 EST 2004
Hi
In my last message I made a misstake:
I wrote:
The error I get is a "Miscellaneous failure" with "Unknown error code"
in the GSS sample client when feeding the gss_init_sec_context
function the token received from the server (gss_accept_sec_context
call).
This should of course be:
The error I get is a "Miscellaneous failure" with "Unknown error code"
in the GSS sample client when feeding the gss_init_sec_context
function the token received from the server (AcceptSecurityContext). <---
thanks
Mattias
mattias.karlsson at sungard.com (Mattias Karlsson) wrote in message news:<5d87dfc1.0411010715.4b3b9f65 at posting.google.com>...
> Hi and thanks for your answer.
>
> I now have a GSS sample client that can authenticate to a SSPI sample
> server. The sample server can then impersonate the client via the SSPI
> call ImpersonteSecurityContext.
>
> However, this does not work if the SSPI sample server runs on a Win
> 2k3 SE machine. It works if the server runs on a XP (SP 1 or SP 2) or
> a Win2K machine. This really puzzles me!
>
> The error I get is a "Miscellaneous failure" with "Unknown error code"
> in the GSS sample client when feeding the gss_init_sec_context
> function the token received from the server (gss_accept_sec_context
> call).
>
> Is it possible that some default configuration etc on Win 2K3 SE
> triggers this? How is Win 2k3 SE different from XP/Win 2K (in a
> "Kerberos view")?
>
> Thanks
> Mattias
>
> deengert at anl.gov ("Douglas E. Engert") wrote in message news:<417014E6.5010308 at anl.gov>...
> > If I am understand you reasoning you don't want to use
> > SSPI because you have some unix servers and clients.
> >
> > But the SSPI and Kerberos GSSAPI use the same wire protocol,
> > so you could be using InitializeSecurityContext on WIndows and
> > gss_accept_sec_context on UNIXservers.
> > We do this all the time with a SecureCRT client on Windows using
> > either Kerberos for Windows gssapi or MS SSPI Kerberos to OpenSSH
> > sshd server with MIT Kerberos gssapi.
> >
> > Going the other way with Unix client using gss_init_sec_context and
> > a windows server using AcceptSecurityContext should also work and
> > delegation should work. I have not tried this. There may be issues when
> > you try and use the delegated credential to impersonate the user as
> > it will need a PAC. Kerberos is strictly authentication. AD add to
> > the Kerberos ticket authorization information. So it may mean you need to
> > use AD for the KDC.
> >
> >
> > Mattias Karlsson wrote:
> > > Hi
> > >
> > > I'm about to kerberize our product and will use the gss api. When
> > > analyzing the different components in our system I found that I need
> > > to be able to impersonate the client in the server using the client
> > > credentials. The reason for doing this is that the server needs to be
> > > able to access Windows resources (registry) with client permissions.
> > >
> > > How it works in the unkerberized client/server is that the client
> > > sends it's Windows user and password to the server in the beginning of
> > > the session. The server does a (WIN API) LogonUser and a
> > > ImpersonateLoggedOnUser and can then act as the client in that thread.
> > >
> > > I don't want to send user/password over the network but need to be
> > > able to impersonate the client!
> > >
> > > The Windows SSPI API provides functions like
> > > InitializeSecurityContext, AcceptSecurityContext and
> > > ImpersonateSecurityContext but I don't want to use SSPI since I got
> > > some UNIX servers and clients as well. Is it possible to use the
> > > delegated_cred_handle or context_handle I get from the gss api call
> > > gss_accept_sec_context and use it (maybe cast it) in the
> > > ImpersonateSecurityContext function? Or is there some other way to do
> > > this? I assume I need to specify the GSS_C_DELEG_FLAG in the clients
> > > gss_init_sec_context call, is there anything else that must be done?
> > >
> > > Thanks
> > > Mattias
> > > ________________________________________________
> > > Kerberos mailing list Kerberos at mit.edu
> > > https://mailman.mit.edu/mailman/listinfo/kerberos
> > >
> > >
> > >
> >
> > --
> >
> > Douglas E. Engert <DEEngert at anl.gov>
> > Argonne National Laboratory
> > 9700 South Cass Avenue
> > Argonne, Illinois 60439
> > (630) 252-5444
> > ________________________________________________
> > Kerberos mailing list Kerberos at mit.edu
> > https://mailman.mit.edu/mailman/listinfo/kerberos
More information about the Kerberos
mailing list