[39443] in Kerberos

home help back first fref pref prev next nref lref last post

Re: one time password integration

daemon@ATHENA.MIT.EDU (Ken Hornstein via Kerberos)
Wed Jul 31 16:38:45 2024

Message-Id: <202407312038.46VKcXkl031026@hedwig.cmf.nrl.navy.mil>
To: Charles Hedrick <hedrick@rutgers.edu>
cc: "kerberos@mit.edu" <kerberos@mit.edu>
In-Reply-To: <PH0PR14MB5493540EBEEFAA44CE2FA876AAB12@PH0PR14MB5493.namprd14.prod.outlook.com>
MIME-Version: 1.0
Date: Wed, 31 Jul 2024 16:38:32 -0400
From: Ken Hornstein via Kerberos <kerberos@mit.edu>
Reply-To: Ken Hornstein <kenh@cmf.nrl.navy.mil>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: kerberos-bounces@mit.edu

>One surprise in doing all of this is that there seems to be no standard
>utility to let us see the auth indicator for the user's credentials. I'm
>probably doing to use one of the test programs (adata). It seems to be
>complicated by having the auth indicator in the encrypted part of the
>ticket.

If you are using the GSSAPI to authenticate, there's a way (it's kind
of complicated and weird, like the rest of the GSSAPI).  There's not a
native way to do that with the Kerberos API; on my list is to submit a
patch to MIT to expose the necessary API (there's a lot of things on
that list, so don't wait for me).  However, if you're interested in
looking at authentication indicators in TGTs, I'm not sure there's a
way to verify the AD-CAMMAC container in a TGT; you'd need to look at
a service ticket (which I suppose you would already have if you were
verifying a Kerberos password).

--Ken
________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

home help back first fref pref prev next nref lref last post