On 30/05/2012 8:13 p.m., James Mackie wrote:
Hi all,

I would like to be able to specify in the Proxy-Authenticate challenge header, 
which SPN (or targetname) I would like the browser to request a ticket for.

After doing some searching I found a document on the MSDN site that seems to 
indicate you can specify it for the 'Kerberos' auth mechanism 
(http://msdn.microsoft.com/en-us/library/cc246225%28v=prot.10%29.aspx)

"Authentication is enabled at the outbound server, and it challenges Alice's 
client. The server indicates support for NTLM and Kerberos in the challenge.
SIP/2.0 407 Proxy Authentication Required

Notice this is the SIP/2.0 protocol. Squid is an HTTP proxy. There is no RFC specification for use of Kerberos scheme name within HTTP.

Via: SIP/2.0/TLS Alice1.contoso.com;branch=z9hG4bK7
From: "Alice"<sip:[email protected]>;tag=354354535;epid=6534555
To: "Alice"<sip:[email protected]>;tag=5564566
Call-ID: [email protected]
CSeq: 12345 REGISTER
Date: Sat, 13 Nov 2010 23:29:00 GMT
Proxy-Authenticate: Kerberos realm="Contoso RTC Service Provider",
    targetname="sip/hs1.contoso.com", qop="auth"
Proxy-Authenticate: NTLM realm="Contoso RTC Service Provider",
    targetname="hs1.contoso.com", qop="auth"
Content-Length: 0
The targetname parameter carries the SPN for this proxy for Kerberos and the FQDN of 
the proxy for NTLM. The actual contents of this parameter must be meaningful for 
this proxy but are opaque to other proxies and the client. It is merely a unique 
string for correlation of the message header to an SA. Two Proxy-Authenticate: 
headers are present, indicating the server's capability to do one of Kerberos or 
NTLM. "

I was wondering if anyone has any experience with what I am trying to do.

Squid supports validating Kerberos security via the Negotiate scheme mehanisms, but does not have configuration support for the Kerberos scheme name at this time.

Amos

Reply via email to