Cross Realm MIT <-> Windows Close But No Cigar
Michael B Allen
mba2000 at ioplex.com
Wed May 2 22:13:32 EDT 2007
Hello,
I struggling with cross realm auth and I'd appreciate it if someone can
give me pointers.
The problem seems to be with enctypes. So I just asserted RC4 everywhere
and now I'm getting all the right tickets but ssh and smbclient still
aren't quite satisfied.
Info about the two domains and ssh / smbclient test results follows.
---- S.W.NET ----
MIT 1.3.4-46 on CentOS 4.4
I created KDC as usual but before creating the db I put the following
in my kdc.conf:
supported_enctypes = arcfour-hmac:normal
I created some principals and it confirmed the enctype was archfour-hmac:
kadmin.local: ktadd test at S.W.NET
Entry for principal test at S.W.NET with kvno 3, encryption type ArcFour
with HMAC/md5 added to keytab WRFILE:/etc/krb5.keytab.
krb5.conf is standard except I added W.NET to the [realms] and
[domain_realm] sections (not sure if that's necessary).
I created a host/ls1.s.w.net at S.W.NET principal and exported it to the
/etc/krb5.keytab (for ssh).
---- W.NET ----
W2K3 standard
ktsetup /addkdc S.W.NET ls1.s.w.net
ktpass /MitRealmName S.W.NET /TrustEncryp RC4
Created two-way trust with AD Domains and Trusts.
Rebooted.
So with everything setup like above I tried ssh and smbclient.
-- Testing with SSH with W.NET TGT --
Ssh doesn't tell me much:
$ ssh -vvv ioplex at ls1.s.w.ne
...
debug1: Next authentication method: gssapi-with-mic
debug3: Trying to reverse map address 192.168.2.20.
debug2: we sent a gssapi-with-mic packet, wait for reply
debug1: Authentications that can continue: publickey,gssapi-with-mic,password
debug2: we sent a gssapi-with-mic packet, wait for reply
debug1: Authentications that can continue: publickey,gssapi-with-mic,password
debug2: we sent a gssapi-with-mic packet, wait for reply
debug1: Authentications that can continue: publickey,gssapi-with-mic,password
debug2: we did not send a packet, disable method
but I can see I have the right tickets:
$ klist
Ticket cache: FILE:/tmp/krb5cc_500
Default principal: ioplex at W.NET
Valid starting Expires Service principal
05/02/07 21:35:40 05/03/07 07:36:11 krbtgt/W.NET at W.NET
renew until 05/03/07 21:35:40
05/02/07 21:36:23 05/03/07 07:36:11 krbtgt/S.W.NET at W.NET
renew until 05/03/07 21:35:40
05/02/07 21:36:04 05/03/07 07:36:11 host/ls1.s.w.net at S.W.NET
renew until 05/02/07 21:36:04
Ssh with an S.W.NET TGT to ls1.s.w.net works fine (no password).
-- Testing with smbclient with S.W.NET TGT --
$ smbclient -k //dc1.w.net/tmp
signing_good: BAD SIG: seq 1
SMB Signature verification failed on incoming packet!
session setup failed: Server packet had invalid SMB signature!
again I have the right tickets:
$ klist
Ticket cache: FILE:/tmp/krb5cc_500
Default principal: ioplex at S.W.NET
Valid starting Expires Service principal
05/02/07 21:27:56 05/03/07 21:27:56 krbtgt/S.W.NET at S.W.NET
05/02/07 21:33:35 05/03/07 21:27:56 krbtgt/W.NET at S.W.NET
05/02/07 21:33:55 05/03/07 07:33:55 dc1$@W.NET
The signature in the SMB response packet is identical to the one
in the request packet (i.e. it was echo'd).
Any ideas?
Do I need to do anything special with DNS?
Mike
--
Michael B Allen
PHP Active Directory Kerberos SSO
http://www.ioplex.com/
More information about the Kerberos
mailing list