nor release.
>
> Regards,
> Kai
>
> -Original Message-
> From: Colm O hEigeartaigh [mailto:cohei...@apache.org]
> Sent: Monday, June 19, 2017 4:45 PM
> To: kerby@directory.apache.org
> Subject: Re: MIT Kerberos compatibility
>
> Yes, it works perfectly, than
@directory.apache.org
Subject: Re: MIT Kerberos compatibility
Yes, it works perfectly, thanks Jiajia for the fix! I'll resolve the JIRA.
Colm.
On Mon, Jun 19, 2017 at 6:09 AM, Li, Jiajia wrote:
> Hi Colm,
> Thanks for providing the way to reproduce the error, and I have the fix in
> trunk
l Message-
> From: Colm O hEigeartaigh [mailto:cohei...@apache.org]
> Sent: Monday, May 8, 2017 6:19 PM
> To: kerby@directory.apache.org
> Subject: Re: MIT Kerberos compatibility
>
> OK I have created a JIRA and attached a patch that you have to apply to the
> Apache WSS4J project
error message with GSS + default
transport.
Thanks
Jiajia
-Original Message-
From: Colm O hEigeartaigh [mailto:cohei...@apache.org]
Sent: Monday, May 8, 2017 6:19 PM
To: kerby@directory.apache.org
Subject: Re: MIT Kerberos compatibility
OK I have created a JIRA and attached a patch
cbc-md4-deprecated not supported
2017-05-04T20:44:06 set-error: -1765328234: Encryption type
des-cbc-crc-deprecated not supported
First kerberos.authGSSClientStep successful
Thanks
Jiajia
-Original Message-
From: Zheng, Kai [mailto:kai.zh...@intel.com]
Sent: Wednesday, May 3, 2017 7:2
"kerby@directory.apache.org"
Date: 08/05/2017 12:58
Subject:RE: MIT Kerberos compatibility
Hi Marc,
Thanks for your patience. It looks to me there is some issue in Kerby with
Heimdal compatibility. Note we haven't supported Heimdal yet. So far, Kerby
is tested and
13 PM
To: kerby@directory.apache.org
Subject: Re: MIT Kerberos compatibility
Hi Jiajia and Kai,
Puzzled by the fact that the Mit Kerberos over python service ticket request
works on Jiajia's system but not on mine. I attempted to request the service
ticket with Mit Kerberos's kinit tool
Thanks Colm for the confirm!
Regards,
Kai
From: Colm O hEigeartaigh [mailto:cohei...@apache.org]
Sent: Monday, May 08, 2017 6:36 PM
To: Zheng, Kai
Cc: kerby@directory.apache.org
Subject: Re: MIT Kerberos compatibility
Hi Kai,
No I think it wasn't caused by recent changes. It's fine
ailto:cohei...@apache.org]
> Sent: Monday, May 08, 2017 6:19 PM
> To: kerby@directory.apache.org
> Subject: Re: MIT Kerberos compatibility
>
> OK I have created a JIRA and attached a patch that you have to apply to the
> Apache WSS4J project to reproduce the error. If you uncommen
e.org]
Sent: Monday, May 08, 2017 6:19 PM
To: kerby@directory.apache.org
Subject: Re: MIT Kerberos compatibility
OK I have created a JIRA and attached a patch that you have to apply to the
Apache WSS4J project to reproduce the error. If you uncomment the line that
uses Netty then the tests all work
s? Any difference between the failed GSS tests and the Kerby
> GSS tests?
>
> Regards,
> Kai
>
> -Original Message-
> From: Colm O hEigeartaigh [mailto:cohei...@apache.org]
> Sent: Monday, May 08, 2017 5:42 PM
> To: Zheng, Kai
> Cc: kerby@directory.apache.org
>
5:42 PM
To: Zheng, Kai
Cc: kerby@directory.apache.org
Subject: Re: MIT Kerberos compatibility
Hi Kai,
Your changes fixed the error message I was seeing. However, I now see another
problem when I run a few GSS client tests in a row:
>>> EType: sun.secu
;>
> >>> Sent from iPhone
> >>>
> >>>> 在 2017年5月6日,上午12:02,Colm O hEigeartaigh 写道:
> >>>>
> >>>> That's probably it. Why does the default transport not support UDP in
> >>> Kerby?
> >>>>
> &
kai.zh...@intel.com]
Sent: Wednesday, May 3, 2017 7:29 PM
To: kerby@directory.apache.org
Subject: RE: MIT Kerberos compatibility
Hi Marc,
In case you're not aware of this, please check out the latest fix
made by Jiajia. We thought your case may be different, but would be
good to have a
al Message-
From: Zheng, Kai [mailto:kai.zh...@intel.com]
Sent: Wednesday, May 3, 2017 7:29 PM
To: kerby@directory.apache.org
Subject: RE: MIT Kerberos compatibility
Hi Marc,
In case you're not aware of this, please check out the latest fix made by
Jiajia. We thought your case may be differen
at's probably it. Why does the default transport not support UDP
>>>> in
>>> Kerby?
>>>>
>>>> Colm.
>>>>
>>>>> On Fri, May 5, 2017 at 4:54 PM, Li, Jiajia wrote:
>>>>>
>>>>> Are you sure add kdc_al
oes the default transport not support UDP in
>>> Kerby?
>>>>
>>>> Colm.
>>>>
>>>>> On Fri, May 5, 2017 at 4:54 PM, Li, Jiajia wrote:
>>>>>
>>>>> Are you sure add kdc_allow_udp = false in kdc.conf?
>>>>&
-Original Message-
From: Marc de Lignie [mailto:m.c.delig...@xs4all.nl]
Sent: Saturday, May 6, 2017 4:13 AM
To: Li, Jiajia
Cc: kerby@directory.apache.org
Subject: Re: MIT Kerberos compatibility
Hi Jiajia,
Thanks for the netty config option. This indeed helped to get rid of the udp
errors, but
>
>>> Colm.
>>>
>>>> On Fri, May 5, 2017 at 4:54 PM, Li, Jiajia wrote:
>>>>
>>>> Are you sure add kdc_allow_udp = false in kdc.conf?
>>>>
>>>> Thanks
>>>> Jiajia
>>>>
>>>> -
y kint and MIT kinit, and only
> >>> listen the tcp port(disable udp), both got ticket successfully. But I
> >>> don't get the error message. Both krb.conf and kdc.conf should set udp
> >>> to be false, udp is enabled in default.
> >>>
> &g
taigh [mailto:cohei...@apache.org]
>> Sent: Friday, May 5, 2017 11:41 PM
>> To: Li, Jiajia
>> Cc: kerby@directory.apache.org; Zheng, Kai ; mailto:
>> m.c.delig...@xs4all.nl
>> Subject: Re: MIT Kerberos compatibility
>>
>> Sorry, it was my error, UDP was
mailto:cohei...@apache.org]
> Sent: Friday, May 5, 2017 11:41 PM
> To: Li, Jiajia
> Cc: kerby@directory.apache.org; Zheng, Kai ; mailto:
> m.c.delig...@xs4all.nl
> Subject: Re: MIT Kerberos compatibility
>
> Sorry, it was my error, UDP was actually enabled there. But why a
]
> Sent: Friday, May 5, 2017 11:34 PM
> To: kerby@directory.apache.org
> Cc: Zheng, Kai ; mailto:m.c.delig...@xs4all.nl <
> m.c.delig...@xs4all.nl>
> Subject: Re: MIT Kerberos compatibility
>
> Hi Jiajia,
>
> If UDP is disabled and we don't use Netty, I can g
Friday, May 5, 2017 11:34 PM
> To: kerby@directory.apache.org
> Cc: Zheng, Kai ; mailto:m.c.delig...@xs4all.nl <
> m.c.delig...@xs4all.nl>
> Subject: Re: MIT Kerberos compatibility
>
> Hi Jiajia,
>
> If UDP is disabled and we don't use Netty, I can get a token succes
ssage-
From: Colm O hEigeartaigh [mailto:cohei...@apache.org]
Sent: Friday, May 5, 2017 11:34 PM
To: kerby@directory.apache.org
Cc: Zheng, Kai ; mailto:m.c.delig...@xs4all.nl
Subject: Re: MIT Kerberos compatibility
Hi Jiajia,
If UDP is disabled and we don't use Netty, I can get a token su
while processing request:Additional pre-authentication
>> required
>> [nioEventLoopGroup-5-1] INFO
>> org.apache.kerby.kerberos.kerb.server.request.AsRequest
>> - AS_REQ ISSUE: authtime 1493991123859,test-service/localh...@test.com
>> for krbtgt/test@test.c
Cc: Zheng, Kai ; mailto:m.c.delig...@xs4all.nl <
> m.c.delig...@xs4all.nl>
> Subject: Re: MIT Kerberos compatibility
>
> Hi Jiajia,
>
> What are the issues if UDP is disabled and we don't use Netty? I tried
> doing this with my own test-cases and it didn't work
7 10:09 PM
To: kerby@directory.apache.org
Cc: Zheng, Kai ; mailto:m.c.delig...@xs4all.nl
Subject: Re: MIT Kerberos compatibility
Hi Jiajia,
What are the issues if UDP is disabled and we don't use Netty? I tried doing
this with my own test-cases and it didn't work, so it would be good
rbtgt/test@test.com
> [nioEventLoopGroup-5-1] INFO
> org.apache.kerby.kerberos.kerb.server.request.TgsRequest
> - TGS_REQ ISSUE: authtime 1493991142850,drankye for test-service/
> localh...@test.com
>
> Thanks
> Jiajia
>
> -Original Message-
> From: Zheng, Kai
&
..@test.com
Thanks
Jiajia
-Original Message-
From: Zheng, Kai
Sent: Friday, May 5, 2017 7:46 PM
To: kerby@directory.apache.org; Li, Jiajia
Subject: RE: MIT Kerberos compatibility
Hi Marc,
Looks like this is quite environment related, could you fire an issue for this?
I would sugge
, Jiajia
Cc: kerby@directory.apache.org
Subject: Re: MIT Kerberos compatibility
Hi Jiajia,
Great to read that you made progress on this issue and to see a working config
at your side. Below, I list my progress below (with trunk merged into my
MitIssue branch), but I am afraid we are not done yet
ncryption type
des-cbc-md4-deprecated not supported
2017-05-04T20:44:06 set-error: -1765328234: Encryption type
des-cbc-crc-deprecated not supported
First kerberos.authGSSClientStep successful
Thanks
Jiajia
-----Original Message-
From: Zheng, Kai [mailto:kai.zh...@intel.com]
Sent: Wednesday
l.com]
Sent: Wednesday, May 3, 2017 7:29 PM
To: kerby@directory.apache.org
Subject: RE: MIT Kerberos compatibility
Hi Marc,
In case you're not aware of this, please check out the latest fix made by
Jiajia. We thought your case may be different, but would be good to have a
check before we can
ssage-
From: Marc de Lignie [mailto:m.c.delig...@xs4all.nl]
Sent: Sunday, April 30, 2017 7:45 PM
To: kerby@directory.apache.org
Subject: Re: MIT Kerberos compatibility
Hi Kai,
The terminal output below is for the latest MIT Kerberos 1.15.1 (locally built
on Ubuntu Xenial). Before that, I
Hi Kai,
The terminal output below is for the latest MIT Kerberos 1.15.1 (locally
built on Ubuntu Xenial). Before that, I also tested with the default
Xenial MIT Kerberos packages (1.13.2), with the same result. I did not
try earlier MIT Kerberos versions.
Marc
Op 29-04-17 om 21:42 schreef M
ry.apache.org
Subject: RE: MIT Kerberos compatibility
Hi Kai,
Thanks for the response. I prepared a minimal config that reproduces my problem.
You can fetch the branch/commit from:
https://github.com/vtslab/directory-kerby/commits/MitIssue
This is relative to RC2, but I also tried this on tr
Hi Kai,
Thanks for the response. I prepared a minimal config that reproduces my
problem.
You can fetch the branch/commit from:
https://github.com/vtslab/directory-kerby/commits/MitIssue
This is relative to RC2, but I also tried this on trunk for my actual
project.
This config produces the
I know it was tested in the case of MIT client + Kerby KDC around some
releases.
Could you post your stack trace or more error/exception message here, or issue
a ticket?
Regards,
Kai
-Original Message-
From: Marc de Lignie [mailto:m.c.delig...@xs4all.nl]
Sent: Wednesday, April 26, 20
38 matches
Mail list logo