Hello,

I struggling with cross realm auth and I'd appreciate it if someone can
give me pointers.

The problem seems to be with enctypes. So I just asserted RC4 everywhere
and now I'm getting all the right tickets but ssh and smbclient still
aren't quite satisfied.

Info about the two domains and ssh / smbclient test results follows.

---- S.W.NET ----

MIT 1.3.4-46 on CentOS 4.4

I created KDC as usual but before creating the db I put the following
in my kdc.conf:

supported_enctypes = arcfour-hmac:normal

I created some principals and it confirmed the enctype was archfour-hmac:

kadmin.local:  ktadd [EMAIL PROTECTED]
Entry for principal [EMAIL PROTECTED] with kvno 3, encryption type ArcFour
with HMAC/md5 added to keytab WRFILE:/etc/krb5.keytab.

krb5.conf is standard except I added W.NET to the [realms] and
[domain_realm] sections (not sure if that's necessary).

I created a host/[EMAIL PROTECTED] principal and exported it to the
/etc/krb5.keytab (for ssh).

---- W.NET ----

W2K3 standard
ktsetup /addkdc S.W.NET ls1.s.w.net
ktpass /MitRealmName S.W.NET /TrustEncryp RC4
Created two-way trust with AD Domains and Trusts.
Rebooted.

So with everything setup like above I tried ssh and smbclient.

-- Testing with SSH with W.NET TGT --

Ssh doesn't tell me much:

$ ssh -vvv [EMAIL PROTECTED]
...
debug1: Next authentication method: gssapi-with-mic
debug3: Trying to reverse map address 192.168.2.20.
debug2: we sent a gssapi-with-mic packet, wait for reply
debug1: Authentications that can continue: publickey,gssapi-with-mic,password
debug2: we sent a gssapi-with-mic packet, wait for reply
debug1: Authentications that can continue: publickey,gssapi-with-mic,password
debug2: we sent a gssapi-with-mic packet, wait for reply
debug1: Authentications that can continue: publickey,gssapi-with-mic,password
debug2: we did not send a packet, disable method

but I can see I have the right tickets:

$ klist 
Ticket cache: FILE:/tmp/krb5cc_500
Default principal: [EMAIL PROTECTED]

Valid starting     Expires            Service principal
05/02/07 21:35:40  05/03/07 07:36:11  krbtgt/[EMAIL PROTECTED]
        renew until 05/03/07 21:35:40
05/02/07 21:36:23  05/03/07 07:36:11  krbtgt/[EMAIL PROTECTED]
        renew until 05/03/07 21:35:40
05/02/07 21:36:04  05/03/07 07:36:11  host/[EMAIL PROTECTED]
        renew until 05/02/07 21:36:04

Ssh with an S.W.NET TGT to ls1.s.w.net works fine (no password).

-- Testing with smbclient with S.W.NET TGT --

$ smbclient -k //dc1.w.net/tmp
signing_good: BAD SIG: seq 1
SMB Signature verification failed on incoming packet!
session setup failed: Server packet had invalid SMB signature!

again I have the right tickets:

$ klist 
Ticket cache: FILE:/tmp/krb5cc_500
Default principal: [EMAIL PROTECTED]

Valid starting     Expires            Service principal
05/02/07 21:27:56  05/03/07 21:27:56  krbtgt/[EMAIL PROTECTED]
05/02/07 21:33:35  05/03/07 21:27:56  krbtgt/[EMAIL PROTECTED]
05/02/07 21:33:55  05/03/07 07:33:55  [EMAIL PROTECTED]

The signature in the SMB response packet is identical to the one
in the request packet (i.e. it was echo'd).

Any ideas?

Do I need to do anything special with DNS?

Mike

-- 
Michael B Allen
PHP Active Directory Kerberos SSO
http://www.ioplex.com/
________________________________________________
Kerberos mailing list           [email protected]
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to