Seamless/transparent SSO with Apache, Win2003, IE

Sung Ho Jee jee.sung at ansaldo-signal.com.au
Thu Nov 10 21:08:17 EST 2005


Did you have the 'Use DES encryption types for this account' option ticked 
for the HTTP service account when generating its keytab file?

Regards,

Sung-ho Jee





Fred Dennis <fd_1972tn at yahoo.com>
Sent by: kerberos-bounces at mit.edu
11/11/2005 12:41 AM

 
        To:     kerberos at mit.edu
        cc: 
        Subject:        Seamless/transparent SSO with Apache, Win2003, IE


I'm trying to create a seamless sign on to a web site
using Solaris (Kerberos installed), Apache
(mod_auth_kerb installed), MS Active directory, and IE
client. 

I can authenticate using and AD user/pass to a website
if the IE option "Enable Integrated Authentication" is
*UN*checked.  When going to the url I get a login
prompt and enter the account information, then am
allowed access to the web site. 

However, when the option is CHECKED, I am passed
directly to the web site (which is what I want), BUT
get the apache log errors below and a "Page cannot be
displayed" error. 

Looking at the packets going to/from web server I can
see some sort of negotiation going on, but also see a
"checksum incorrect" message.  The ethereal output is
below.

I would greatly appreciate assistance with this.  I've
been trying to find a solution for the past week to no
avail.

Thanks!

============ APACHE ERROR LOG ===============
[Thu Nov 10 08:34:37 2005] [debug]
src/mod_auth_kerb.c(1322): [client 10.76.105.97]
kerb_authenticate_user entered with user (NULL) and
auth_type Kerberos
[Thu Nov 10 08:34:37 2005] [debug]
src/mod_auth_kerb.c(1023): [client 10.76.105.97]
Acquiring creds for
HTTP/curly.corp.inthosts.net at MAX.INTHOSTS.NET

================ PACKET CAPTURE ===============
Frame 7 (2051 bytes on wire, 2051 bytes captured)
Ethernet II, Src: Intel_40:15:ec (00:d0:b7:40:15:ec),
Dst: All-HSRP-routers_01 (00:00:0c:07:ac:01)
Internet Protocol, Src: 10.76.105.97 (10.76.105.97),
Dst: 10.76.65.113 (10.76.65.113)
Transmission Control Protocol, Src Port: 3188 (3188),
Dst Port: http (80), Seq: 315, Ack: 853, Len: 1997
    Source port: 3188 (3188)
    Destination port: http (80)
    Sequence number: 315    (relative sequence number)
    Next sequence number: 2312    (relative sequence
number)
    Acknowledgement number: 853    (relative ack
number)
    Header length: 20 bytes
    Flags: 0x0018 (PSH, ACK)
    Window size: 64683

*****************************************************
*****************************************************
* CHECKSUM ERROR -- comments added by me
*****************************************************
*****************************************************

    Checksum: 0xbf70 [incorrect, should be 0x2f4c]
    SEQ/ACK analysis
Hypertext Transfer Protocol
    GET /cgi-bin/1/printenv HTTP/1.1\r\n
        Request Method: GET
        Request URI: /cgi-bin/1/printenv
        Request Version: HTTP/1.1
    Accept: image/gif, image/x-xbitmap, image/jpeg,
image/pjpeg, */*\r\n
    Accept-Language: en-us\r\n
    UA-CPU: x86\r\n
    Accept-Encoding: gzip, deflate\r\n
    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0;
Windows NT 5.2; SV1; .NET CLR 1.1.4322)\r\n
    Host: curly.corp.inthosts.net\r\n
    Connection: Keep-Alive\r\n
    Authorization: Negotiate
YIIE1QYGKwYBBQUCoIIEyTCCBMWgJDAiBgkqhkiC9xIBAgIGCSqGSIb3EgECAgYKKwYBBAGCNwICCqKCBJsEggSXYIIEkwYJKoZIhvcSAQICAQBuggSCMIIEfqADAgEFoQMCAQ6iBwMFACAAAACjggOmYYIDojCCA56gAwIBBaESGxBNQVguSU5USE9TVFMuTkVUoiowKKADAgECoSEwHx
        GSS-API Generic Security Service Application
Program Interface
            OID: 1.3.6.1.5.5.2 (SPNEGO - Simple
Protected Negotiation)
            SPNEGO
                negTokenInit
                    mechTypes: 3 items
                        Item: 1.2.840.48018.1.2.2 (MS
KRB5 - Microsoft Kerberos 5)
                        Item: 1.2.840.113554.1.2.2
(KRB5 - Kerberos 5)
                        Item: 1.3.6.1.4.1.311.2.2.10
(NTLMSSP - Microsoft NTLM Security Support Provider)
                    mechToken:
6082049306092A864886F71201020201006E820482308204...
                    krb5_blob:
6082049306092A864886F71201020201006E820482308204...
                        KRB5 OID: 1.2.840.113554.1.2.2
(KRB5 - Kerberos 5)
                        krb5_tok_id: KRB5_AP_REQ
(0x0001)
                        Kerberos AP-REQ
                            Pvno: 5
                            MSG Type: AP-REQ (14)
                            Padding: 0
                            APOptions: 20000000
(Mutual required)
                                .0.. .... .... ....
.... .... .... .... = Use Session Key: Do NOT use the
session key to encrypt the ticket
                                ..1. .... .... ....
.... .... .... .... = Mutual required: MUTUAL
authentication is REQUIRED
                            Ticket
                                Tkt-vno: 5
                                Realm:
MAX.INTHOSTS.NET
                                Server Name (Service
and Instance): HTTP/curly.corp.inthosts.net
                                    Name-type: Service
and Instance (2)
                                    Name: HTTP
                                    Name:
curly.corp.inthosts.net
                                enc-part rc4-hmac
                                    Encryption type:
rc4-hmac (23)
                                    Kvno: 2
                                    enc-part:
B03EAB462F73653D61D98C3CA97705CFFD50D177D14021EA...
                            Authenticator rc4-hmac
                                Encryption type:
rc4-hmac (23)
                                Authenticator data:
E3A02A891F9A43AD16797C0D26D395BA356381948B70C925...
    \r\n



 
__________________________________ 
Start your day with Yahoo! - Make it your home page! 
http://www.yahoo.com/r/hs
________________________________________________
Kerberos mailing list           Kerberos at mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos




More information about the Kerberos mailing list