gss_accept_sec_context failing after getting service ticket usingservice name and password

Michael B Allen mba2000 at ioplex.com
Mon May 29 15:55:46 EDT 2006


On Mon, 29 May 2006 14:16:23 +0530
"Gaurav Gaba" <gauravg77 at gmail.com> wrote:

> Also, is there a way by which I can do away with the keytab mechanism all
> together?

Sure. Most kerberos implementations have "string to key" routines that
can produce a key from a password. Drill down through the source for
krb5_get_init_creds_password. Once you have the key you might be able
to maually create a gss_cred_id_t that gss_accept_sec_context will
recognise. Otherwise you will need to modify GSSAPI to accept the key
directly and then use it to decrypt client data. Easy!

Not.

The "normal" way this is done is to generate a keytab from a
password. This is not difficult. You can do it using ktpass.exe if your
KDC is Windows. Then call putenv("KRB5_KTNAME=/path/to/service.keytab")
before gss_accept_sec_context is called.

Mike



More information about the krbdev mailing list