[23978] in Kerberos

home help back first fref pref prev next nref lref last post

Re: Using Solaris 10 kadmin with MIT 1.4.1 kadmind

daemon@ATHENA.MIT.EDU (Douglas E. Engert)
Thu Jun 2 15:53:03 2005

Message-ID: <429F6295.5060400@anl.gov>
Date: Thu, 02 Jun 2005 14:48:37 -0500
From: "Douglas E. Engert" <deengert@anl.gov>
MIME-Version: 1.0
To: Sam Hartman <hartmans@mit.edu>
In-Reply-To: <tsl64ww4kby.fsf@cz.mit.edu>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
cc: "'kerberos@mit.edu'" <kerberos@mit.edu>
Errors-To: kerberos-bounces@mit.edu



Sam Hartman wrote:

>>>>>>"Nicolas" == Nicolas Williams <Nicolas.Williams@sun.com> writes:
> 
> 
>     Nicolas> Known bug.  Our RPCSEC_GSS APIs force us to use hostbased
>     Nicolas> princs for the server, and MIT krb5, though it now
>     Nicolas> implements RPCSEC_GSS, did not match this behaviour.
> 
> No.  If you create the hostbased principal in your kdc database it
> should work fine.  The MIT code supports both kadmin/fqdn and
> kadmin/admin.


I have both, and it looks like the client kadmin is getting a ticket for
kadmin/fqdn.

> 
> ________________________________________________
> Kerberos mailing list           Kerberos@mit.edu
> https://mailman.mit.edu/mailman/listinfo/kerberos
> 
> 
> 

-- 

  Douglas E. Engert  <DEEngert@anl.gov>
  Argonne National Laboratory
  9700 South Cass Avenue
  Argonne, Illinois  60439
  (630) 252-5444
________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

home help back first fref pref prev next nref lref last post