search for: krb5_parse_name

Displaying 12 results from an estimated 12 matches for "krb5_parse_name".

2004 Dec 23
0
Is there a fix available for CAN-2003-0190(with test program)
...= krb5_init_context(&context); if(problem) { printf("\nproblem in initialization and krb5_init_context fails\n"); exit(0); } else printf("\nNo problem in initialization and krb5_init_context succeeds\n"); } problem=krb5_parse_name(context,str,&client); if(problem) { printf("\nproblem in parsing and krb5_parse_name fails\n"); exit(0); } else printf("\nNo problem in parsing and krb5_parse_name succeeds\n"); mypassword=argv[2]; problem=krb5_get_init_creds_passw...
2009 Mar 27
1
Patch for default Kerbers realm in AIX
...domain attribute, requests are sent to to the SOMEWHERE realm instead of the default realm DEFAULTREALM, which is listed in the libdefaults section of the krb5.conf configuration file. If I look at the code I can see the following in auth-krb5.c on line 88, which causes this behaviour: problem = krb5_parse_name(authctxt->krb5_ctx, authctxt->pw->pw_name,&authctxt->krb5_user); Since authctxt->pw->pw_name contains only the user name (without a realm), the default realm will be automatically appended according to the documentation of the krb5_parse_name call. Since this isn't the co...
2003 Aug 10
9
updated gssapi diff
...+ * GSSAPI mechanisms will need their own. + * Returns true if the user is OK to log in, otherwise returns 0 + */ + +static int +ssh_gssapi_krb5_userok(ssh_gssapi_client *client, char *name) +{ + krb5_principal princ; + int retval; + + if (ssh_gssapi_krb5_init() == 0) + return 0; + + if ((retval = krb5_parse_name(krb_context, client->exportedname.value, + &princ))) { + logit("krb5_parse_name(): %.100s", + krb5_get_err_text(krb_context, retval)); + return 0; + } + if (krb5_kuserok(krb_context, princ, name)) { + retval = 1; + logit("Authorized to %s, krb5 principal %s (krb5_...
2001 Jun 28
1
Adding 'name' key types
Playing around with the [wonderful] GSS-API patches for OpenSSH [1] I noticed that there is a bit of functionality missing from OpenSSH/GSS-API, namely that authorized_keys2 has no meaning when using GSS authentication. Yes, ~/.k5login can be used to grant access to an account for applications that support Kerberos, as does OpenSSH with those GSS patches, but .k5login does not and cannot provide
2009 Mar 03
2
GSSAPI cross-realm fixed
Attached is a patch which in my environment (Linux/Heimdal 1.2.1) fixes cross-realm GSSAPI authentication. Changes it makes: 1. When using krb5_kuserok, do not call gss_compare_name to check that authn_name and authz_name are the same. Instead, make TWO calls to krb5_kuserok, one for each ID. If both IDs are acceptable, allow the login. 2. Disable checking that the name is a
2009 Apr 02
17
[Bug 1583] New: User principal name in AIX
...domain attribute, requests are sent to to the SOMEWHERE realm instead of the default realm DEFAULTREALM, which is listed in the libdefaults section of the krb5.conf configuration file. If I look at the code I can see the following in auth-krb5.c on line 88, which causes this behaviour: problem = krb5_parse_name(authctxt->krb5_ctx, authctxt->pw->pw_name,&authctxt->krb5_user); Since authctxt->pw->pw_name contains only the user name (without a realm), the default realm will be automatically appended according to the documentation of the krb5_parse_name call. Since this isn't the co...
2012 Apr 18
0
ANNOUNCE: cifs-utils release 5.4 is ready for download
...c5dcf26c0d87d9e8342d2c946e039066de29d30a Author: Jeff Layton <jlayton at samba.org> Date: Thu Mar 29 09:11:29 2012 -0400 cifs.upcall: use krb5_sname_to_principal to construct principal name Currently, we build the string by hand then then construct the principal name with krb5_parse_name. That bypasses the domain_realm section in krb5.conf however. Switch the code to use krb5_sname_to_principal instead which is more suited to this task. In order for that to work, we change a couple of calling functions to pass down a hostname instead of a principal name, an...
2007 Sep 13
0
Compilation error when linking libsmbclient.so :-(
...@krb5_3_MIT' /net/172.17.8.206/usr/local/avinash/p4/iControl/src/subsystems/src/thirdparty/libs/libsmbclient.so: undefined reference to `krb5_kt_free_entry@krb5_3_MIT' /net/172.17.8.206/usr/local/avinash/p4/iControl/src/subsystems/src/thirdparty/libs/libsmbclient.so: undefined reference to `krb5_parse_name@krb5_3_MIT' /net/172.17.8.206/usr/local/avinash/p4/iControl/src/subsystems/src/thirdparty/libs/libsmbclient.so: undefined reference to `krb5_kt_default@krb5_3_MIT' /lib/libssl.so.6: undefined reference to `krb5_rc_initialize@krb5_3_MIT' /lib/libssl.so.6: undefined reference to `valid_ck...
2018 Feb 12
3
FreeBSD Core dump: PAM authentication with Kerberos credentials (GSSAPI_MIT)
...gister() Feb 11 09:20:40 mail auth: in openpam_get_option(): entering: 'auth_as_self' Feb 11 09:20:40 mail auth: in openpam_get_option(): returning NULL Feb 11 09:20:40 mail auth: in pam_sm_authenticate(): Created principal: woodsb02 Feb 11 09:20:40 mail auth: in pam_sm_authenticate(): Done krb5_parse_name() Feb 11 09:20:40 mail auth: in pam_sm_authenticate(): Got principal: woodsb02 at WOODS.AM Feb 11 09:20:40 mail auth: in pam_get_authtok(): entering Feb 11 09:20:40 mail auth: in pam_get_item(): entering: PAM_RHOST Feb 11 09:20:40 mail auth: in pam_get_item(): returning PAM_SUCCESS Feb 11 09:20:40...
2018 Feb 12
0
FreeBSD Core dump: PAM authentication with Kerberos credentials (GSSAPI_MIT)
...auth: in openpam_get_option(): entering: > 'auth_as_self' > Feb 11 09:20:40 mail auth: in openpam_get_option(): returning > NULL > Feb 11 09:20:40 mail auth: in pam_sm_authenticate(): Created principal: > woodsb02 > Feb 11 09:20:40 mail auth: in pam_sm_authenticate(): Done krb5_parse_name() > Feb 11 09:20:40 mail auth: in pam_sm_authenticate(): Got principal: > woodsb02 at WOODS.AM > Feb 11 09:20:40 mail auth: in pam_get_authtok(): > entering > Feb 11 09:20:40 mail auth: in pam_get_item(): entering: > PAM_RHOST > Feb 11 09:20:40 mail auth: in pam_get_item(): ret...
2002 Jan 24
1
PATCH: krb4/krb5/... names/patterns in auth_keys entries
...ssapi_cred_cache { @@ -98,24 +99,39 @@ ssh_gssapi_krb5_userok(char *name) { krb5_principal princ; int retval; + char *by; + Key k; if (ssh_gssapi_krb5_init() == 0) return 0; - + + k.type = KEY_NAME; + k.name = gssapi_client_name.value; + k.name_type = "krb5"; + if ((retval=krb5_parse_name(krb_context, gssapi_client_name.value, &princ))) { log("krb5_parse_name(): %.100s", krb5_get_err_text(krb_context,retval)); return 0; } - if (krb5_kuserok(krb_context, princ, name)) { + + /* Try authorized_keys first */ + by = "authorized_keys"; + retv...
2001 Aug 15
0
[ossh patch] principal name/patterns in authorized_keys2
..._init() == 0) return 0; + k.type = KEY_NAME; + k.name = gssapi_client_name.value; + k.name_len = strlen(gssapi_client_name.value); + k.name_type = "krb5"; + + debug3("ssh_gssapi_krb5_userok:"); + debug3("ssh_gssapi_krb5_userok: %s", k.name_type); + if ((retval=krb5_parse_name(krb_context, gssapi_client_name.value, &princ))) { log("krb5_parse_name(): %.100s", krb5_get_err_text(krb_context,retval)); return 0; } + + retval2 = user_key_allowed(getpwnam(name), &k); + if (retval2 < 0) { + krb5_free_principal(krb_context, princ); +...