Rocksolid Light

Welcome to novaBBS (click a section below)

mail  files  register  newsreader  groups  login

Message-ID:  

"Cogito ergo I'm right and you're wrong." -- Blair Houghton


devel / comp.protocols.kerberos / Re: Creating a principal using the kadmin C API

SubjectAuthor
o Re: Creating a principal using the kadmin C APILars Francke

1
Re: Creating a principal using the kadmin C API

<mailman.40.1649411841.8148.kerberos@mit.edu>

  copy mid

https://www.novabbs.com/devel/article-flat.php?id=235&group=comp.protocols.kerberos#235

  copy link   Newsgroups: comp.protocols.kerberos
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!tncsrv06.tnetconsulting.net!.POSTED.mailman.mit.edu!not-for-mail
From: lars.fra...@gmail.com (Lars Francke)
Newsgroups: comp.protocols.kerberos
Subject: Re: Creating a principal using the kadmin C API
Date: Fri, 8 Apr 2022 11:56:39 +0200
Organization: TNet Consulting
Lines: 27
Message-ID: <mailman.40.1649411841.8148.kerberos@mit.edu>
References: <CAD-Ua_ifa=vo4PEzy3kx-5FB3J+hhN_2BTuS7O=E+hfudRbV4Q@mail.gmail.com>
<733bbe58-7c13-8abc-f0e6-3cbe979540ed@mit.edu>
<CAD-Ua_h4BfxWMKZu+QqJCNUemWux56jmQ+J5U8LWqYFgJjGPwg@mail.gmail.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Injection-Info: tncsrv06.tnetconsulting.net; posting-host="mailman.mit.edu:18.7.21.50";
logging-data="25215"; mail-complaints-to="newsmaster@tnetconsulting.net"
Cc: kerberos@mit.edu
To: Greg Hudson <ghudson@mit.edu>
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
b=b5qDT3CpQhaDNczaJoiF9RPgD09sMIzgfl3H7yb1MFRZ2qaSs/01j0CJaAPKFhnbNWqmscBN9JqZewVnWsZkoZQPEEI+nzoGh5lCyFLhII1ugDxmMUjFoVY6IeydpuTMu5j5Cr1ckPdK2/wo3nvdyN6T34qvt5KI6kVSZN3GsvBDL8H++J7GdZl+lLVtBDzcO3y9i17d1ngZXyNLrNscJMTEFoD4k04vGLuA/qnlABTvA7e5+VdIJCQfS5mDlP7gNFmF07uM5bBW3+VYT2LiYuyG7/ykE1HAdEJZSf05XsIdI5/eS+edzefTRH4aSm8lMAB9fr9Jj/G66l7bdEJwGg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
s=arcselector9901;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
bh=W+mWVIzpHR4AjZL4x6Vig/hD3lB1amk3VKKg7/krNMQ=;
b=WTPMCLmRvo/AaisWM/a8oc+m8d7kD8u6xA2TimJsL85oyqAtiCu/gpOgtpz2v8nOvL+Jwf867iFlAHYP+3KilfesGt0AZzNTzMCgXD5rISBEDRqSibu8W4dEo7KO8xjCeIAqWCQwpdtDogEhe0QNhcwMYpiM1ZbcsTEZTTj1r5bfRluk0T8mpD6TWiFdeefib5RkwXhE3Ttr8mvYhyc9VQYg0tZQJgeVfbZ7zZ0WW6W9nUdzWSAAxNTdSLFZDbKrGEjwwFKfCbVxF7d77mb1SHVc9EFgGpoHhL55iTHTWGU18MwMWcL4Jf6oIVO316maAgodwarXewtOrlunvQMbTQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
209.85.208.50) smtp.rcpttodomain=mit.edu smtp.mailfrom=gmail.com; dmarc=pass
(p=none sp=quarantine pct=100) action=none header.from=gmail.com; dkim=pass
(signature was verified) header.d=gmail.com; arc=none (0)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=mitprod.onmicrosoft.com; s=selector2-mitprod-onmicrosoft-com;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
bh=W+mWVIzpHR4AjZL4x6Vig/hD3lB1amk3VKKg7/krNMQ=;
b=s8GwZvSyWw49pninDn0zGXcYJAM5vCIYdvVFq9iggQ/MYXjy1jtY4OWSQVFobNKSxLAbzfAuoeSw7ttVp4shQqu9pR7723HPsCFfJJWhRtCh6yj4oH3KpJ0KTuKDHko8zkw6nI+VMadozWBZQKzmjpushloig2t8XZhTneJM3DY=
Authentication-Results: spf=pass (sender IP is 209.85.208.50)
smtp.mailfrom=gmail.com; dkim=pass (signature was verified)
header.d=gmail.com;dmarc=pass action=none header.from=gmail.com;
Received-SPF: Pass (protection.outlook.com: domain of gmail.com designates
209.85.208.50 as permitted sender) receiver=protection.outlook.com;
client-ip=209.85.208.50; helo=mail-ed1-f50.google.com;
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112;
h=mime-version:references:in-reply-to:from:date:message-id:subject:to
:cc; bh=W+mWVIzpHR4AjZL4x6Vig/hD3lB1amk3VKKg7/krNMQ=;
b=nknTr7uHpbZ9HGz9HOawRzUwjne3TBElMHPsQVfa2e0PVyYGiflZ5DEMD+iq/tuPkT
nohnBgkcDfrCxLKOcE+Jr5lyEDzYGb/QgnBXlPMPcrPF3kWu8j/5IjZfv5R/VNhX29FV
v4/fV+Tf/HIfjCgGjtNhV3sICsBJS2l1dIQfbFe7A0FPokbkoYPRKqEFP4+WJ//l5riB
Vf+UApdy0MQfXyIz0mCePObD9udPUJDQIF9jXXoL4LU1Mr4sGaT3URm38OwDaq+nj+WL
d06BlVxvCMzyDz2bR4ZuGGN8eleNCzr7tz1abUIsBFZyvqetgaByI6fCKGzFXg0J4pHK
U0Iw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=1e100.net; s=20210112;
h=x-gm-message-state:mime-version:references:in-reply-to:from:date
:message-id:subject:to:cc;
bh=W+mWVIzpHR4AjZL4x6Vig/hD3lB1amk3VKKg7/krNMQ=;
b=f+7eJ0qAie6ffkyy5qpI06sb+71UVI2DLr+mRWbQje0VT2waGzihYk1ucxyicF7QGb
hu4fDs8klPNmWq+Kxnu76PYAyvNFHIW/MdUG8zpS/OJUaXIAI8n+v42+9nz8qFZw7L3G
Je7/eWh8GicGLSf7A9X7cUmA+yfAchK3OTM8GDVNf0TlTOVCJyFV3uyDjjF6P+1KNCbu
tj6y774rque4ZpfAQbV3jWS6NUpJZdQKDmycOd2zblppBY70HyWNdhRVIn+4jScmS9ex
Mr/wlPqocfWhHwCW+hXOVu4p3ASEWheW1/t/4taauZXo4OelQtpsbpvWHtu5Fig/rif2
HRCQ==
X-Gm-Message-State: AOAM53369bAZXtRC2oDk0xsI483ZqO75bpADS8gdXTY6FtjddR18UkqL
1sUX7VjFqeRy03b22SNd0ql2R3wb/vWuMIzs7DIL4KQY
X-Google-Smtp-Source: ABdhPJz7CW7niA3n0CMdOJwAjLo6A4ns16sh1oNcJu48+dY+YTSsyaa/vQkV8gmM9INJHMvsb0q6Vz1b9mSSeKLkq2w=
X-Received: by 2002:a05:6402:2682:b0:41d:2f74:7269 with SMTP id
w2-20020a056402268200b0041d2f747269mr1587022edd.255.1649411836082; Fri, 08
Apr 2022 02:57:16 -0700 (PDT)
In-Reply-To: <733bbe58-7c13-8abc-f0e6-3cbe979540ed@mit.edu>
X-EOPAttributedMessage: 0
X-EOPTenantAttributedMessage: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b:0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: d5b2c7dd-1954-45d6-0e13-08da19462a37
X-MS-TrafficTypeDiagnostic: MN2PR01MB5664:EE_
X-LD-Processed: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b,ExtAddr
X-MS-Exchange-AtpMessageProperties: SA
X-Microsoft-Antispam-PRVS: <MN2PR01MB56640BC8570BAF1481EF3DA28FE99@MN2PR01MB5664.prod.exchangelabs.com>
X-MS-Exchange-SenderADCheck: 0
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: Lu0cI7TcvIy1bNCHwGB7u4hybWvniItDOgn6u/+KfGTdfh34nUHW7ckV4Sd11DaBqJCYRt4XUUorlEd5b7qg7Fe3B/KDQRGHtcf6IVjx/IhFmAGs88GcCLV6C8j+4TXHvW/Sn+t1TqY1uQTDJU7zL10egl8O4Xf5FYXI0qQzruw3dyJIksRJGsT4Ar4buHV1KVHFhHPhtfAEfJSDmedJ7obn9bkXaOEyI6W0h5cNau+jAFoBOhzefy/bMO3SjKOgeZm0I65puwhpOjQcag5c2HfFzNB6i1sp+ztliv015L56ovs7KSjzKAxttZ9lew/2ZSFYovk06LfecAJp1bJ84N7elzw2YD24eB3xAj3gG8iSqCLpOatzYFiSi2dL6r2KrkupGd1sEWw7Ef4Wy/TWDg3TfUZkac+U0bKnzx8fxQkDOh/GTXBbXQmUy7JVwAJwUt3RIe13kfKrMtWgZRCUaPsMJboPr9dWBm4YVAwuhkvMLTY8cCbDMGljF0lu4EM1rNpJ4cA8P43j81B1AaRHfsBaD26UvJa7zPl6evLNyakuW6/5/jb+8Nckockrr5lTyXS4L5HCSs8MscGShZpvJrXg/sTTkH7INeMWzKUWkesgqcye8BkL8EfB5H7o/YOo
X-Forefront-Antispam-Report: CIP:209.85.208.50; CTRY:US; LANG:en; SCL:1; SRV:;
IPV:NLI; SFV:NSPM; H:mail-ed1-f50.google.com; PTR:mail-ed1-f50.google.com;
CAT:NONE;
SFS:(13230001)(4636009)(84050400002)(44832011)(83380400001)(86362001)(508600001)(2906002)(4326008)(336012)(8676002)(68406010)(70586007)(5660300002)(6862004)(76482006)(55446002)(356005)(26005)(7636003)(73392003)(42186006)(7596003)(316002)(33964004)(53546011)(6666004)(82202003)(786003);
DIR:OUT; SFP:1102;
X-Auto-Response-Suppress: DR, OOF, AutoReply
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Apr 2022 09:57:17.3002 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: d5b2c7dd-1954-45d6-0e13-08da19462a37
X-MS-Exchange-CrossTenant-Id: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b
X-MS-Exchange-CrossTenant-AuthSource: DM6NAM11FT008.eop-nam11.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: Internet
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR01MB5664
X-OriginatorOrg: mitprod.onmicrosoft.com
X-Content-Filtered-By: Mailman/MimeDel 2.1.34
X-BeenThere: kerberos@mit.edu
X-Mailman-Version: 2.1.34
Precedence: list
List-Id: The Kerberos Authentication System Mailing List <kerberos.mit.edu>
List-Unsubscribe: <https://mailman.mit.edu/mailman/options/kerberos>,
<mailto:kerberos-request@mit.edu?subject=unsubscribe>
List-Archive: <http://mailman.mit.edu/pipermail/kerberos/>
List-Post: <mailto:kerberos@mit.edu>
List-Help: <mailto:kerberos-request@mit.edu?subject=help>
List-Subscribe: <https://mailman.mit.edu/mailman/listinfo/kerberos>,
<mailto:kerberos-request@mit.edu?subject=subscribe>
X-Mailman-Original-Message-ID: <CAD-Ua_h4BfxWMKZu+QqJCNUemWux56jmQ+J5U8LWqYFgJjGPwg@mail.gmail.com>
X-Mailman-Original-References: <CAD-Ua_ifa=vo4PEzy3kx-5FB3J+hhN_2BTuS7O=E+hfudRbV4Q@mail.gmail.com>
<733bbe58-7c13-8abc-f0e6-3cbe979540ed@mit.edu>
 by: Lars Francke - Fri, 8 Apr 2022 09:56 UTC

Thank you. We'll look into this again next week and will see if we can get
it running.
We must have taken a wrong turn somewhere.

Good to hear that it _should_ work!

On Fri, Apr 8, 2022 at 6:35 AM Greg Hudson <ghudson@mit.edu> wrote:

> On 4/7/22 16:19, Lars Francke wrote:
> > We tried to use kadm5_create_principal_3 and kadm5_randkey_principal_3
> but
> > we seem to be running into an issue. Ideally we'd like to call this
> > function with a handle (+ context) with an in-memory krb5.conf but that
> > does not seem to work so we create the files and refer to them in the
> > profile but kadmin still seems to load (is this related to the
> > "alt_profile"?) a file from a default location which means it'll use the
> > wrong connection details.
>
> krb5_init_context_profile() lets you supply a profile object. If this
> is created with profile_init_path(), the application should be able to
> strictly control which file is used.
>
> It is possible to create an in-memory profile with
> profile_init_vtable(). Perhaps it would be nicer if one could create an
> empty in-memory profile object and populate it with
> profile_add_relation(), but that is not currently implemented.
>

1
server_pubkey.txt

rocksolid light 0.9.8
clearnet tor