[krbdev.mit.edu #2425] Multiple bugs and a few feature requests
Matt Lytle
mjl at cert.org
Tue Mar 23 11:11:09 EST 2004
> Matt Lytle via RT wrote:
>
>> Bug1: Leash32 from 2.6Beta7 crashes when starting on a Windows 2000
>> machine when attached to a remote network with no VPN connection. Error
>> message (note memory addresses changes): "The instruction at
>> 0x77fcca36" referenced memory at "0x000c0100" the memory could not be
>> written". This does not occur on Windows XP boxes, and leash32 runs
>> fine after the vpn connection is established.
>>
> In other words, you are reporting that Leash is crashing
> when there is a network connection but the KDC for the
> default realm is not reachable when run on Windows 2000.
> Is this correct?
>
That was correct, although it appears to be fixed with beta 9 that you had
me test.
>
>> Bug2: It appears that for some reason that Leash32 likes to disable the
>> AFS Status setting. It appears to happen when it can not contact the
>> cell for some reason. Can this be changed or over ridden? Possibly
>> with a registry key. We are trying to support remote users, and run
>> leash32 on startup (in the task tray) and it is very inconvenient for
>> them to have to enable the afs properties frequently.
>>
> The AFS Status is disabled when there is a problem
> communicating with the AFS Client Service. This is
> a bug in the AFS Client. OpenAFS version 1.3.60 fixes
> this problem. The cause is a race condition between
> the pioctl() and RPC calls necessary for performing
> Token operations with the AFS Client Service. The
> AFS library libauthent.dll did not place a system
> global critical section around both operations allowing
> multiple applications such as Leash32.exe and afscreds.exe
> to step on each others toes.
>
Good to know, we are going to be using the 1.3.61 client soon.
>> Bug3: When obtaining tickets via ms2mit.exe and when they expire you
>> receive an error message that says: Ticket expired (Kerberos error 32)
>> krb5_get_renewed_creds() failed. However, clicking ok, and then using
>> the renew button in leash it works.
>>
> Confirm that you have the correct configuration data
> for your Windows Domain and KDC within the KRB5.INI
> file. Leash possesses renewable tickets in its cache
> but is unable to renew the tickets. Most likely it
> cannot contact your KDC.
> Another possibility is that your KDC is refusing to
> renew the tickets. In which case, Windows simply uses
> the cached username and password to perform a new TGS
> request which cannot be done by Leash directly.
>
So would requesting non-renewable tickets solve this problem? My krb5.ini
is correct. Although it seems that all tickets imported with ms2mit have
the R flag. How do I avoid that?
>> Feature Reqest1: Add options like -aklog to leash32 to be used in
>> conjunction with -ms2mit. Also add -persistent to leash32 to be used in
>> conjunction with -ms2mit, so it does the -ms2mit then stays in the task
>> tray. I would like to be able to call something like "leash32 -ms2mit
>> -aklog -persistent" from the command line.
>>
> Use the -autoinit option as described in the documentation.
> This will automatically perform an import from the MSLSA
> cache when the session is Kerberos authenticated.
>>
Can there be an option added so that -autoinit also does an aklog?
>> Feature Request2: Make ms2mit optionally run as a service. It would be
>> nice if it ran in the background (or through leash32) and automatically
>> extracted tickets from the ms lsa cache when they were renewed.
>>
> This is how Leash currently behaves when properly configured and
> auto-ticket-renewal is turned on.
It seems to work with the exception of the above error message. As I
mentioned above using ms2mit causes the tickets to have the R flag set.
>
> Jeffrey Altman
> Kerberos for Windows maintainer.
Thanks,
Matt
>
>
> _______________________________________________
> krb5-bugs mailing list
> krb5-bugs at mit.edu
> https://mailman.mit.edu/mailman/listinfo/krb5-bugs
More information about the krb5-bugs
mailing list