<HTML><HEAD><TITLE>Samsung Enterprise Portal mySingle</TITLE>
<META content="text/html; charset=utf-8" http-equiv=Content-Type>
<STYLE id=mysingle_style type=text/css>P {
        MARGIN-TOP: 5px; FONT-FAMILY: Arial, arial; MARGIN-BOTTOM: 5px; 
FONT-SIZE: 9pt
}
TD {
        MARGIN-TOP: 5px; FONT-FAMILY: Arial, arial; MARGIN-BOTTOM: 5px; 
FONT-SIZE: 9pt
}
LI {
        MARGIN-TOP: 5px; FONT-FAMILY: Arial, arial; MARGIN-BOTTOM: 5px; 
FONT-SIZE: 9pt
}
BODY {
        LINE-HEIGHT: 1.4; MARGIN: 10px; FONT-FAMILY: Arial, arial; FONT-SIZE: 
9pt
}
</STYLE>

<META name=GENERATOR content=ActiveSquare></HEAD>
<BODY>
<P>Hi Mark,</P>
<P><STRONG>Thank you&nbsp;for your timely response and 
explaination.</STRONG></P>
<P>Also i will be good if you please share&nbsp; some links/pdf on kerberos 
cross realm authentication</P>
<P>w.r.t. requests and implementation details&nbsp; like the requests going out 
form client .</P>
<P>&nbsp;</P>
<P>Regards</P>
<P>Naveen</P>
<P>------- <B>Original Message</B> -------</P>
<P><B>Sender</B> : Mark Pr�hl&lt;[email protected]&gt;</P>
<P><B>Date</B> : Jan 07, 2011 19:33 (GMT+09:00)</P>
<P><B>Title</B> : Re: Cross realm authentication</P>
<P>&nbsp;</P>On 01/06/2011 05:02 AM, krbmit siso wrote:<BR>&gt; Hi 
Mark,<BR>&gt;<BR>&gt; Please find the attached capture for cross realm setup . 
I did not <BR>&gt; understand why do you require<BR>&gt; 2 TGS-REQ going from 
client , please shed some light on the same .<BR><BR>the following sketch shows 
the principals involved in cross realm 
<BR>authentication:<BR><BR>&nbsp;&nbsp;&nbsp;&nbsp;cient&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
 realm-1 
KDC<BR>&nbsp;&nbsp;&nbsp;&nbsp;cli...@realm1&nbsp;&nbsp;-&gt;&nbsp;&nbsp; 
krbtgt/rea...@realm1<BR><BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;^<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;|<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;TRUST<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;krbtgt/rea...@realm1<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;krbtgt/rea...@realm2<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;|<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;v<BR><BR>&nbsp;&nbsp;&nbsp;&nbsp;
 service &lt;-&nbsp;&nbsp; realm-2KDC<BR>&nbsp;&nbsp;&nbsp;&nbsp; 
serv...@realm2&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;krbtgt/rea...@realm2<BR><BR><BR>cross
 realm authentication usually works this way (scenario-1):<BR><BR>step 1: 
client requests a TGT in his realm: AS-REQ/AS-REP for 
<BR>krbtgt/rea...@realm1<BR>step 2: client decides that service belongs to 
REALM2 (by client <BR>configuration, dns topology or kdc referrals)<BR>step 3: 
client request a cross-realm TGT for REALM2 by TGS-REQ to <BR>realm-1 KDC: 
krbtgt/rea...@realm1<BR>step 4: client request a service ticket for 
serv...@realm2 by TGS-REQ to <BR>realm-2 KDC. clients presents 
krbtgt/rea...@realm1<BR><BR>that is why two TGS request are sent from a client 
in a typical scenario.<BR><BR>your cross realm scenario (from wireshark 
capture) looks this way <BR>(scenario-2):<BR><BR>step 1: client request a 
cross-realm TGT for REALM2 by AS-REQ to realm-1 <BR>KDC for 
krbtgt/rea...@realm1<BR>step 2: client request a service Ticket for 
serv...@realm2 by TGS-REQ to <BR>realm-2 KDC. clients presents 
krbtgt/rea...@realm1<BR><BR>that should work as well but is not the usual 
way.<BR><BR>The problem could be caused by your client or the trust setup 
between <BR>the two windows domains.<BR>To test the trust setup you should 
simulate the client by using kinit <BR>and kvno from MIT 
Kerberos:<BR><BR>simulate scenario-1: kinit cli...@realm1; kvno 
serv...@realm2<BR>simulate scenario-2: kinit -S krbtgt/rea...@realm1 
cli...@realm1; kvno <BR>serv...@realm2<BR><BR>your krb5.conf or DNS SRV records 
should provide the configuration for <BR>both realms.<BR><BR>if that works then 
your trust setup is 
ok.<BR><BR>________________________________________________<BR>Kerberos mailing 
list&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
[email protected]<BR>https://mailman.mit.edu/mailman/listinfo/kerberos<BR>
<P>&nbsp;</P>
<P>&nbsp;</P><!--SP:naveen.bn--><!--naveen.bn:EP-->
<P>&nbsp;</P>
<TABLE id=confidentialsignimg>
<TBODY>
<TR>
<TD NAMO_LOCK>
<P><IMG border=0 src="cid:[email protected]" 
width=520></P></TD></TR></TBODY></TABLE></BODY></HTML><img 
src='http://ext.samsung.net/mailcheck/SeenTimeChecker?do=819bad59c7908697b2d7709a7a17502e1340377536ec945f4b240a564ff6e9cb7c86263f3d414723d2cb7c2a93c43c11a728c55b39cc59eacf878f9a26ce15a0'
 border=0 width=0 height=0 style='display:none'>
________________________________________________
Kerberos mailing list           [email protected]
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to