Re: [modauthkerb] Negotiate on Windows with cross-realm trust ADand MIT Kereros.

2007-07-25 Thread Douglas E. Engert
Looks like it should have worked. A wireshark trace of the packets would show a lot, as long as the session is not encrypted. It could be a size issue. AD can produce very large tickets if you are in many groups. It could be an enc-type issue, which the server does not understand It could be

Re: [modauthkerb] Negotiate on Windows with cross-realm trust ADand MIT Kereros.

2007-07-25 Thread Mikkel Kruse Johnsen
On Mon, 2007-07-23 at 16:27 -0500, Douglas E. Engert wrote: Mikkel Kruse Johnsen wrote: Hi Markus Yes that is what I want. I need the KRB5CCNAME (the credential) so I can login to my OpenLDAP SASL based server and PostgreSQL with kerberos. So what you need is the Kerberos

Re: [modauthkerb] Negotiate on Windows with cross-realm trust ADand MIT Kereros.

2007-07-25 Thread Henry B. Hotz
On Jul 25, 2007, at 2:55 AM, Mikkel Kruse Johnsen wrote: Is the KRB5CCNAME being set in the environment of the subprocess. Don't know how to check this. The KRB5CCNAME is in the env. with the attached patch but the credetials is never saved to that file. Protect CGI's and access a cgi

Implementing OTP mechanism with existing kerberos

2007-07-25 Thread Gopal Paliwal
Hi, I am implementing OTP mechanism in the existing kerberos. I have set up pre-auth mechanism to authenticate the clients. Now, the user will be asked password+OTP instead of just password. i will be generating this OTP with a hardware token. Also, i will be encrypting time-stamp with password

Re: Implementing OTP mechanism with existing kerberos

2007-07-25 Thread Gopal Paliwal
hi Tim, It's really nice. i could see that you are able to use hardware tokens with MIT kerberos. If u are comfortable, could you explain me the way you have done it. it will be great. -gopal On 7/25/07, Tim Alsop [EMAIL PROTECTED] wrote: Gopal, It is not easy to do. If you are interested,

Re: Implementing OTP mechanism with existing kerberos

2007-07-25 Thread Douglas E. Engert
Gopal Paliwal wrote: Hi, I am implementing OTP mechanism in the existing kerberos. I have set up pre-auth mechanism to authenticate the clients. Now, the user will be asked password+OTP instead of just password. i will be generating this OTP with a hardware token. Also, i will be

RE: Implementing OTP mechanism with existing kerberos

2007-07-25 Thread Tim Alsop
Gopal, Sorry if I mislead you in any way. I don't think I mentioned MIT Kerberos in my email. The product I used is called TrustBroker and is commercially available from CyberSafe, and is not based on MIT or Heimdal, and is not open source. I just wanted to show you so you can see that what you

RE: Implementing OTP mechanism with existing kerberos

2007-07-25 Thread Tim Alsop
Gopal, It is not easy to do. If you are interested, we already have a solution - see example below : # kinit talsop Password for [EMAIL PROTECTED]: Enter Passcode (PIN+Tokencode) or Tokencode from your SecurID Token: # klist -ef Cache Type: Kerberos V5 Credentials Cache Cache

Re: [modauthkerb] Negotiate on Windows with cross-realm trust ADand MIT Kereros.

2007-07-25 Thread Achim Grolms
On Wednesday 25 July 2007 11:55, Mikkel Kruse Johnsen wrote: Compiled the mod_auth_kerb with the attched The modification does a check if GSS_C_DELEG_FLAG is present. From my point of view (a paranoid point of view) an additional check has to follow: before the code does the call to