preauth mechanism functioning at the client-side

Tim Alsop Tim.Alsop at CyberSafe.Com
Mon Aug 13 14:03:28 EDT 2007


Gopal,
 
Thankyou for the explanation. I am sorry, but I cannot help you on this
question. I hope somebody else can.
 
Take care,
Tim

________________________________

From: Gopal Paliwal [mailto:gopalpaliwal at gmail.com] 
Sent: 13 August 2007 18:58
To: Tim Alsop; jaltman at secure-endpoints.com
Cc: krbdev at mit.edu
Subject: Re: preauth mechanism functioning at the client-side


Hi,
Thanks for the reply.
Currently the number 32 which I assigned for the new-preauth type is'nt
having conflict with the existing ones as I did go thru RFC's & relevant
code for this change.
 
The problem I am facing is AS_RES does contain this preauth-type as a
hint (i captured it on etheral and could see the number 32 as a
type/value pair). 
 
Also the client is able to get this hint. THis hint preauth goes in
sort_padata_seq() code at the client side but client somehow selects
preauth value 2 (pa_enc_timestamp) to fill preauth data & sends that to
server. 
---->When I avoid just send my required preauth(32) to the client and
dont send pa_enc_timestamp(2) to the client as a edata hint, client
gives me an error like "LOOP detacted at the in krb5_get_in_tkt". This
is due to the fact that client doesn't get preauth type(2) from the
client side. 
 
I wish to know specifically, why client is not accepting any other
preauth apart from type-2 in my case. And whether client can send
2-preauth types back to the server.
 
-gopal 

 
On 8/13/07, Tim Alsop <Tim.Alsop at cybersafe.com> wrote: 

	Gopal
	
	You may remember that I replied to your last email, showing you
the
	output from our software, which already supports RSA SecurID,
VASCO 
	Digipass and Secure Computing SafeWord tokens. To implement this
we have
	support in our client software to handle hardware authentication
	pre-auth type. This is so that the client can ask the user for
the
	information from the token + pin (if applicable). Without any
client 
	code changes the client is only aware of how to ask for a
principal name
	and password.
	
	Also, when you select a pre-auth type, please check the RFCs in
case of
	a conflict with other pre-auth types that are known. 
	
	Regards,
	Tim
	
	-----Original Message-----
	From: krbdev-bounces at mit.edu [mailto:krbdev-bounces at mit.edu] On
Behalf
	Of Gopal Paliwal
	Sent: 13 August 2007 18:23
	To: krbdev at mit.edu
	Subject: preauth mechanism functioning at the client-side
	
	hi,
	
	I am implementing a OTP support mechanism in existing kerberos
1.6.1.
	Till now, i have done the server changes and the AS_REP contains
one
	more
	required timestamp as OTP one. I wish to know, will the existing
client
	be
	able to send 2 preauth sequences (one is pa_enc_timestamp) and
the other 
	one
	is my declared preauth-using OTP.
	Or the client just sends any-one of the asked preauth type.
	
	I see that the server would able to support more than one
preauth-type
	sent
	by the client by making it verify each preauth type in a loop
but i am 
	not
	sure about how the client behaves in sending multi-preauth
types.
	
	I debugged the client code and I could make out that the client
gets my
	created preauth mechanism as hint but still it selects
enc_time-stamp as 
	a
	default one to reply back. The number I chose for my preauth
type is 32.
	
	
	Regards,
	-Gopal Paliwal
	_______________________________________________
	krbdev mailing list             krbdev at mit.edu
	https://mailman.mit.edu/mailman/listinfo/krbdev
	





More information about the krbdev mailing list