Displaying 3 results from an estimated 3 matches for "krb5_kvno".
2003 Oct 16
0
Samba 3.0.0 CVS 3.0.1pre2: "libads/kerberos_verify.c", line 77: improper member use: keyblock
...char *host_princ_s,
                                     krb5_data password,
                                     krb5_enctype *enctypes,
                                     krb5_keytab *keytab,
                                     char *keytab_name)
{
        krb5_keytab_entry entry;
        krb5_kvno kvno = 1;
        krb5_error_code ret;
        krb5_keyblock *key;
        int i;
[... lines deleted ...]
                entry.keyblock  = *key;
The problem is that the structure member name is key, not keyblock.
>From krb5.h
typedef struct krb5_keytab_entry_st {
    krb5_magic magic;...
2006 Jul 13
2
Kerberos Keytab Code Update in 3.0.23
First thing - I'd like to say a big "THANK YOU" to the developers.
I just upgraded to samba-3.0.23 and I've noticed an alarming issue with
respect to my configuration.
I've been using the built-in keytab management and it looks like the updated
code no longer creates the userPrincipal in Active Directory.
Whether this is an issue for others or not, it would be nice to have
2019 Dec 16
2
Failed to find [principal](kvno 4) in keytab MEMORY:cifs_srv_keytab (arcfour-hmac-md5)]
...er can step in here and help understand a few
things:
A) Am I correct in my understanding that the in-memory keytab is created on
   each request? How could it possibly be different for different client
   machines?
B) How does fill_mem_keytab_from_secrets() work without ever setting kvno?
      krb5_kvno kvno = 0; /* FIXME: fetch current vno from KDC ? */
  This is particularly interesting because fill_keytab_from_password() is
  called with old(er) machine passwords, passing `kvno - 1` and `kvno - 2`
  which will will be (-1) and (-2) which seem completely invalid.
  There's a lot of confusi...