[36578] in Kerberos

home help back first fref pref prev next nref lref last post

Re: Help interpreting wireshark traces

daemon@ATHENA.MIT.EDU (Rick van Rein)
Sat Oct 25 19:07:15 2014

Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
From: Rick van Rein <rick@openfortress.nl>
In-Reply-To: <544C2B62.60109@lhanke.de>
Date: Sun, 26 Oct 2014 01:07:02 +0200
Message-Id: <F9F09224-6A5C-4F40-BB47-1144750C7642@openfortress.nl>
To: debian@lhanke.de
Cc: kerberos@mit.edu
Content-Type: text/plain; charset="windows-1252"
Errors-To: kerberos-bounces@mit.edu
Content-Transfer-Encoding: 8bit

Hi,

> Messing up the default keytabs would also silence my speakers immediately, since the music is served by kerberized NFS4.

Indeed, that sounds like the keytabs are fine.

> My question was about extracting the principal used for authentication from the SASL trace. This hopefully is not AD specific.

Nope.  You should be able to zoom in on the GSS-API exchange, I think I’ve done that before.  It’s loaded with OIDs that tag content, and that is actively used by WireShark.  You could compare the one that works and the one that doesn’t.  Is this failing for you?

-Rick
________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos


home help back first fref pref prev next nref lref last post