Tyson Oswald wrote:
> 
> I did a manual comparision between the two files like this
> 
> on Windows ktpass -in my.keytab
> 
> on unix klist -k -K
> 
> they are identical.
> 
> Any idea what the ticket option FORWARDED means?

It means the ticket was issued based on a previous TGT. i.e. this
is usually by delegations as done by GSSAPI.  That may not be the problem.


When you setup the servic e principal for the machine, it should have
had a name like host/[EMAIL PROTECTED]
where myserver.ameritech.net is the FQDN of the host, and MY.REALM
is the realm where hte host is registered. 

P.S. We have sun workstaions using pam_krb5 which allow one to login
to the workstaion fromn the console. We are using the MIT Kerberos, not
SEAM. 

Somethinhg else to try:  

login to the Sun using normal login. 

 Using the SEAM commands: 
  
  kinit [EMAIL PROTECTED]
  klist -f -e

Then try 

  kinit -S t/[EMAIL PROTECTED]

which will ask for your user and password, then try and get a service ticket
for the host. 

Also look at the /etc/krb5.conf file. (I think SEAM uses the same locaiton.)


> 
> thanks,
> 
> Tyson Oswald
> 
> "Douglas E. Engert" <[EMAIL PROTECTED]> wrote:
> 
> Tyson Oswald wrote:
> >
> > Tyson Oswald wrote: I generated a host key on the a Windows server and installed 
> > it on the Sun workstation with ktutil. The key was generated with the same 
> > password as the user on windows. It was setup with DES-CBC-CRC enctype, also 
> > krb5.conf is setup to use des-cbc-crc for both tkt and tgs. One thing I did do was 
> > when I FTPed the host key to the Sun box I used binary instead of ascii, if that 
> > caused a problem I do not know. If you think this could cause this issue I will 
> > re-copy it.
> 
> Anyother way to do it is when you run the ktpass /out ...
> it will type out the entry on the console, and show the kvno and the
> DES key in hex.
> 
> You can then use the ktutil "addent -key" and type in the DES key in
> hex on the UNIX system. This avoids any string-to-key problems, as well
> as any transfer problems.
> 
> If nothing else you cold verify if the key and kvno is as expected
> by using klist -k -K ...
> 
> >
> > thank you,
> >
> > Tyson Oswald
> >
> > Jeffrey Altman wrote:
> > Do you have a host key for the Windows workstation?
> >
> > Does the Windows workstation know the name you have used for its host key?
> >
> > Is the host key restricted to use an enctype of DES-CBC-CRC?
> >
> > Did you create the host key with a password and not a random key?
> >
> > Did you install the password into the Workstation using KSETUP?
> >
> > Jeffrey Altman
> >
> > Tyson Oswald wrote:
> > > Hello all,
> > >
> > > I read the white paper on the MS site
> > > (http://www.microsoft.com/windows2000/techinfo/planning/security/kerbsteps.asp)
> > > to setup AD authentication on Unix. It is based on MIT KDC, but I am
> > > using SEAM. Since SEAM is based on MIT, I assumed it would work. I
> > > am using SEAM 1.0.1 on SPARC Solaris 8. I followed the instructions
> > > in the white paper, and according to the event log on our PDC the user
> > > authenticates successfully. But, the Service Ticket is failing
> > > authentication. I am troubled as to why. The event id I am getting
> > > in the event log is 677. The failure code is 0x0d (bad option) and
> > > the ticket option is 0x02. According the the RFC 0x02 menas FORWARDED.
> > >
> > > Has anyone run into this error or know what is wrong?
> > >
> > > thank you,
> > >
> > > Tyson Oswald
> >
> > ________________________________________________
> > Kerberos mailing list [EMAIL PROTECTED]
> > https://mailman.mit.edu/mailman/listinfo/kerberos
> 
> --
> 
> Douglas E. Engert
> Argonne National Laboratory
> 9700 South Cass Avenue
> Argonne, Illinois 60439
> (630) 252-5444
> ________________________________________________
> Kerberos mailing list           [EMAIL PROTECTED]
> https://mailman.mit.edu/mailman/listinfo/kerberos

-- 

 Douglas E. Engert  <[EMAIL PROTECTED]>
 Argonne National Laboratory
 9700 South Cass Avenue
 Argonne, Illinois  60439 
 (630) 252-5444
________________________________________________
Kerberos mailing list           [EMAIL PROTECTED]
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to