[36578] in Kerberos
Re: Help interpreting wireshark traces
daemon@ATHENA.MIT.EDU (Rick van Rein)
Sat Oct 25 19:07:15 2014
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
From: Rick van Rein <rick@openfortress.nl>
In-Reply-To: <544C2B62.60109@lhanke.de>
Date: Sun, 26 Oct 2014 01:07:02 +0200
Message-Id: <F9F09224-6A5C-4F40-BB47-1144750C7642@openfortress.nl>
To: debian@lhanke.de
Cc: kerberos@mit.edu
Content-Type: text/plain; charset="windows-1252"
Errors-To: kerberos-bounces@mit.edu
Content-Transfer-Encoding: 8bit
Hi,
> Messing up the default keytabs would also silence my speakers immediately, since the music is served by kerberized NFS4.
Indeed, that sounds like the keytabs are fine.
> My question was about extracting the principal used for authentication from the SASL trace. This hopefully is not AD specific.
Nope. You should be able to zoom in on the GSS-API exchange, I think I’ve done that before. It’s loaded with OIDs that tag content, and that is actively used by WireShark. You could compare the one that works and the one that doesn’t. Is this failing for you?
-Rick
________________________________________________
Kerberos mailing list Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos