Re: GSSAPI Key Exchange Patch for OpenSSH 4.7p1

2007-10-01 Thread Henry B. Hotz
That does sound interesting. Count me in. On Sep 28, 2007, at 2:26 PM, Douglas E. Engert wrote: Sounds interesting. And yes, I would be interested in the cascading credentials delegation code. Does the delegation code depend on the key exchange code? What would it take to get both of

Re: cross realm and capaths question

2007-10-01 Thread Douglas E. Engert
Markus Moeller wrote: Markus Moeller [EMAIL PROTECTED] wrote in message news:[EMAIL PROTECTED] Douglas E. Engert [EMAIL PROTECTED] wrote in message news:[EMAIL PROTECTED] You say the KDCs are Windows DCs? and the TEST.HOME is not in the forest? I assume the client LDAP is using the MIT

Listing what's already mapped

2007-10-01 Thread treschaud33
How can I list all the servers that I have mapped with the Ktpass command? We are using Kerberos for SSO from our Middle Tier application that we develop. To make this work I must map the middle Tier's servername with an account in the domain. Here's a sample ktpass command that I use to do

Re: Listing what's already mapped

2007-10-01 Thread Christopher D. Clausen
[EMAIL PROTECTED] wrote: How can I list all the servers that I have mapped with the Ktpass command? We are using Kerberos for SSO from our Middle Tier application that we develop. To make this work I must map the middle Tier's servername with an account in the domain. Here's a sample

Re: cross realm and capaths question

2007-10-01 Thread Christopher D. Clausen
Douglas E. Engert [EMAIL PROTECTED] wrote: Markus Moeller wrote: TGS-REP error_code: KRB5KDC_ERR_PATH_NOT_ACCEPTED (28) This looks like AD is checking the transited path, and does not like it. RFC4120 section 2.7 does not require the KDC to check the transited field, and the client may even

Re: Listing what's already mapped

2007-10-01 Thread treschaud33
On Oct 1, 11:27 am, Christopher D. Clausen [EMAIL PROTECTED] wrote: from a cmd.exe prompt (on a computer joined to this domain,) you can run net group domain computers /domain to get a list all every computer account. (Assuming you are indeed using computer accounts and not user accounts.)

Re: Listing what's already mapped

2007-10-01 Thread Nikhil
Is there anyway to enumerate this a see all the Logon names? probably use adsiedit.msc on Windows to look into the properties or use the dcquery command or even ldapsearch command on Unix to enumerate the user properties and see for attributes userprincipalname/samaccountname Nikhil

Re: Listing what's already mapped

2007-10-01 Thread Christopher D. Clausen
[EMAIL PROTECTED] wrote: On Oct 1, 11:27 am, Christopher D. Clausen [EMAIL PROTECTED] wrote: from a cmd.exe prompt (on a computer joined to this domain,) you can run net group domain computers /domain to get a list all every computer account. (Assuming you are indeed using computer accounts

Re: Listing what's already mapped

2007-10-01 Thread Douglas E. Engert
[EMAIL PROTECTED] wrote: How can I list all the servers that I have mapped with the Ktpass command? We are using Kerberos for SSO from our Middle Tier application that we develop. To make this work I must map the middle Tier's servername with an account in the domain. Here's a sample