Is it possible to authenticate Windows clients against MIT Kerberos (no AD)?

Cosimo La Torre latorrecosimo80 at gmail.com
Fri Apr 1 08:21:41 EDT 2011


Hi folks,
I have been trying to configure a WinXP client to authenticate against MIT
Kerberos V with no success (linux clients all work fine)...
I would be very grateful if anyone can help me. I have used ksetup.exe on
the windows clients to configure REALM, KDC and so on.
This is what I have configured so far:

========================== kdc.conf ===============================

[root at centos]# cat /var/kerberos/krb5kdc/kdc.conf
[kdcdefaults]
 v4_mode = nopreauth
 kdc_tcp_ports = 88

[realms]
EXAMPLE.COM = {
  database_name = /var/kerberos/krb5kdc/principal
  master_key_type = des3-hmac-sha1
  acl_file = /var/kerberos/krb5kdc/kadm5.acl
  dict_file = /usr/share/dict/words
  admin_keytab = /var/kerberos/krb5kdc/krb5.keytab
  supported_enctypes = des3-hmac-sha1:normal arcfour-hmac:normal
des-hmac-sha1:normal des-cbc-md5:normal des-cbc-crc:normal des-cbc-crc:v4
des-cbc-crc:afs3
  default_principal_flags = -preauth
}

=========================
[root at centos]# kadmin.local
Authenticating as principal root/admin at EXAMPLE.COM with password.
kadmin.local:  listprincs
K/M at EXAMPLE.COM
*user at EXAMPLE.COM
host/winxp.example.com at EXAMPLE.COM*
kadmin/admin at EXAMPLE.COM
kadmin/changepw at EXAMPLE.COM
kadmin/history at EXAMPLE.COM
krbtgt/EXAMPLE.COM at EXAMPLE.COM
root/admin at EXAMPLE.COM

============================ named.conf =============================
centos                IN    A    172.24.16.97
winxp                         IN    A    172.24.16.135
_ldap._tcp.                IN    SRV    0    0    389    centos
_ldap._tcp.dc._msdcs        IN    SRV    0    0    389    centos
_kerberos._tcp            IN    SRV    0    0    88    centos
_kerberos._tcp.dc._msdcs    IN    SRV    0    0    88    centos
_kerberos._udp            IN    SRV    0    0    88    centos
_kerberos._udp.dc._msdcs    IN    SRV    0    0    88    centos
kerberos            IN    CNAME    centos

******FORWARD AND REVERSE LOOKUP WORK FINE*******

======================= ksetup (WindowsXP) =======================

C:\Documents and Settings\Administrator>hostname
winxp

C:\Documents and Settings\Administrator>*ksetup*
default realm = EXAMPLE.COM (external)
EXAMPLE.COM:
        kdc = centos.example.com
        Realm Flags = 0xf SendAddress TcpSupported Delegate NcSupported
Mapping user at EXAMPLE.COM to guest.


======================= FAILED WINDOWS LOGIN ==========================

Apr 01 13:16:33 laptop61a krb5kdc[6812](info): AS_REQ (7 etypes {23 -133
-128 3 1 24 -135}) 172.24.16.136: ISSUE: authtime 1301660193, etypes {rep=23
tkt=16 ses=23}, user at EXAMPLE.COM for krbtgt/EXAMPLE.COM at EXAMPLE.COM
Apr 01 13:16:33 laptop61a krb5kdc[6812](info): TGS_REQ (7 etypes {23 -133
-128 3 1 24 -135}) 172.24.16.136: ISSUE: authtime 1301660193, etypes {rep=23
tkt=16 ses=23}, user at EXAMPLE.COM for host/winxp.example.com at EXAMPLE.COM

No logs found in MS Event Viewer

========================== LINUX CLIENT IS FINE
==============================
user at linuxclient:~$ kinit user
Password for user at EXAMPLE.COM:

user at linuxclient:~$ klist -fe
Ticket cache: FILE:/tmp/krb5cc_1000
Default principal: user at EXAMPLE.COM

Valid starting     Expires            Service principal
04/01/11 13:10:45  04/02/11 13:10:45  krbtgt/EXAMPLE.COM at EXAMPLE.COM
    renew until 04/01/11 13:10:45, Flags: FPRI
    Etype (skey, tkt): Triple DES cbc mode with HMAC/sha1, Triple DES cbc
mode with HMAC/sha1



More information about the Kerberos mailing list