Rocksolid Light

Welcome to novaBBS (click a section below)

mail  files  register  newsreader  groups  login

Message-ID:  

"You need tender loving care once a week - so that I can slap you into shape." -- Ellyn Mustard


devel / comp.protocols.kerberos / Re: Creating a principal using the kadmin C API

SubjectAuthor
o Re: Creating a principal using the kadmin C APIChris Hecker

1
Re: Creating a principal using the kadmin C API

<mailman.42.1649440493.8148.kerberos@mit.edu>

  copy mid

https://www.novabbs.com/devel/article-flat.php?id=237&group=comp.protocols.kerberos#237

  copy link   Newsgroups: comp.protocols.kerberos
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!tncsrv06.tnetconsulting.net!.POSTED.mailman.mit.edu!not-for-mail
From: chec...@d6.com (Chris Hecker)
Newsgroups: comp.protocols.kerberos
Subject: Re: Creating a principal using the kadmin C API
Date: Fri, 8 Apr 2022 11:53:58 -0600
Organization: TNet Consulting
Lines: 35
Message-ID: <mailman.42.1649440493.8148.kerberos@mit.edu>
References: <CAD-Ua_ifa=vo4PEzy3kx-5FB3J+hhN_2BTuS7O=E+hfudRbV4Q@mail.gmail.com>
<733bbe58-7c13-8abc-f0e6-3cbe979540ed@mit.edu>
<CAOdMLc3BvSqYFPEH7CoDim2yWH77GPBXYg=i-Xo4pnhyj+Drzg@mail.gmail.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Injection-Info: tncsrv06.tnetconsulting.net; posting-host="mailman.mit.edu:18.7.21.50";
logging-data="31319"; mail-complaints-to="newsmaster@tnetconsulting.net"
Cc: Lars Francke <lars.francke@gmail.com>, kerberos@mit.edu
To: Greg Hudson <ghudson@mit.edu>
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
b=c8xJRta+euEqN9U59tXL6ZIdm0Ku5pLeD1jtkRzk34+idQ3Bpnv8+aWRnMycybdtpgRCj3tPab1uvIwFZteW0NggB6D3HyQXlmthn9go4LJ88Yq7LxTfdZGwVjFJuGg0BaMIdA3SVZnURfGD8jabBF/QGcwmEEW4osjHswzTaTjs75/1bgb8HGm9zAdVhos50puF7dwMbQAFg35VLeo2ooRAouiABg1EIfSzxL+L5s08KatwqjfCNsQetSCuBjvJ0Y/eBjpiGTVMtaV7SxlolQGz5d5hF5qwWB6wwVKYDY/5NLmoMmfAihSA72++s0lcf3elD6iqgYikZyfa05LG7A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
s=arcselector9901;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
bh=XzsTZ8BEiEgKx4iZu5y2H2UxBqlUyOkgCTgZTbeI4g4=;
b=ayvXwfN1WOnJo04YzqFAHaXE2HMDxB+oN4xYADCen4uKrcMEZKz8QsAbgs8EAGgnJkF0Uyzrx7V7wksYXp4L9CiYz+Sef6D5q07lop1xNybQcLBfcT+M0SqQ9ofxwgtZrWmF8j0Sn6CLi4O0Un10yNgil5pbXFZQGCp5IOPL18DTNQub/PmpHVD3133qEnLmjiBB/AUDNu2LXqXGEaLEeaglUvMT6eU6nFurVca1P41o3XYDDZTWE3NyDOCOHl+PU39PTyON6BCvCYAp6fcV216mtbXw1jzdgo5ZU8PUhYYMWMGjenPbIfYTtWLUkgsYrzUyM1dPeARyw9Aj+M5pMg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
209.85.222.42) smtp.rcpttodomain=mit.edu smtp.mailfrom=d6.com; dmarc=pass
(p=none sp=none pct=100) action=none header.from=d6.com; dkim=pass (signature
was verified) header.d=d6-com.20210112.gappssmtp.com; arc=none (0)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=mitprod.onmicrosoft.com; s=selector2-mitprod-onmicrosoft-com;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
bh=XzsTZ8BEiEgKx4iZu5y2H2UxBqlUyOkgCTgZTbeI4g4=;
b=dNdhfIhV8j9zSZF2gkQPuflGrK15ccOk4DN1XKpGbfNP/Axo25Qtoj9DK74QkMRW+oThQ82f8jAZY6bRzx12cFA5S011e4HlaIUiNT4hvUloKMUBqKV+Pqem2uO060pgSVQ6ITvAVVD6ndpCrcuo9cP0wCD3w7E9z/MnIPtzecw=
Authentication-Results: spf=pass (sender IP is 209.85.222.42)
smtp.mailfrom=d6.com; dkim=pass (signature was verified)
header.d=d6-com.20210112.gappssmtp.com;dmarc=pass action=none
header.from=d6.com;
Received-SPF: Pass (protection.outlook.com: domain of d6.com designates
209.85.222.42 as permitted sender) receiver=protection.outlook.com;
client-ip=209.85.222.42; helo=mail-ua1-f42.google.com;
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=d6-com.20210112.gappssmtp.com; s=20210112;
h=mime-version:references:in-reply-to:from:date:message-id:subject:to
:cc; bh=XzsTZ8BEiEgKx4iZu5y2H2UxBqlUyOkgCTgZTbeI4g4=;
b=jWn19yS4gndFMw2tRaABHETp3gzRN0KyjINfDBPno5V0nITzNnD0lQt0IddQW/E3ek
dvJB/poe9b5jFYL85CrRnUfYIii4v2jSVrApmsHEDXfUkoa905oxS3xZCFS+CRtqEyn/
9Dcmqph3l1ftPJuE/m5MVfxjVC5CtZFxAru7XBlnQsucOftV2WIwoUjaTdJEYIQfdNMp
gOJfvoFVAUTSqiA4AkP88MCTQJzT2PvuKaaI4JNtXY9auo3vTS27gKr6orcy2vb86H1+
s8coLFOMorOQAIfvS0skswhh2D5ajZcwQT1FJ2DLMEm+fgx2TYjdBxjBVsl+S4d7ObxZ
y50Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=1e100.net; s=20210112;
h=x-gm-message-state:mime-version:references:in-reply-to:from:date
:message-id:subject:to:cc;
bh=XzsTZ8BEiEgKx4iZu5y2H2UxBqlUyOkgCTgZTbeI4g4=;
b=OVo4Onr4Mh8FZvkwzmbL7dH1anZOXbwnJwwQBTYFWqrl1szYOeLcHStNHbKWu+Qam3
Mu8qnKyH0YHcVD8aS0xtTaSpsxfU2jvnWsiFhPnjusb+BVvIbwW3b9BItiVq9XD+oWy6
vzYEGJm6gQtwVvzuJ9QMXmhD6A8eHgXyvbgHcpe8an9990Fx1WkCukRdRZfi5t0je4Fh
2Zx3gL6vAaskZMnauaM4WoDpS1jOXYqABDtkEjXh73FE43kDbkg+O1VefoVxdHs5OQ2d
UI6CKaIhOmei7Lahb8Tkhd8mMSSFFCIWxJMyKCIZMMB+fnqIVebLQAKKJjnh6bn28gAF
5CEw==
X-Gm-Message-State: AOAM531328f1YoOYgJrw6ILINcw+0UuI/xt2zyjgxFaKZ8Rnk/5tS/Nk
XBdphNpy+TPaNzq8Vfd8119kO4OiZxNZGY2naVP5yw==
X-Google-Smtp-Source: ABdhPJxT7dWrcHNeARLl72GH0fG8YgGsNwxl0pIGiNN5C78UlGPvQ3leeJ8sEmTyRD2olUiEw8gzBUicOYj577TEesY=
X-Received: by 2002:a9f:3272:0:b0:359:eded:9c7e with SMTP id
y47-20020a9f3272000000b00359eded9c7emr5818591uad.35.1649440449426; Fri, 08
Apr 2022 10:54:09 -0700 (PDT)
In-Reply-To: <733bbe58-7c13-8abc-f0e6-3cbe979540ed@mit.edu>
X-EOPAttributedMessage: 0
X-EOPTenantAttributedMessage: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b:0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: f8506dd5-c0e5-4143-5ef1-08da1988c8c5
X-MS-TrafficTypeDiagnostic: BL0PR01MB5154:EE_
X-LD-Processed: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b,ExtAddr
X-MS-Exchange-AtpMessageProperties: SA
X-Microsoft-Antispam-PRVS: <BL0PR01MB515476CC36B1520ECC5EAC0396E99@BL0PR01MB5154.prod.exchangelabs.com>
X-MS-Exchange-SenderADCheck: 0
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:209.85.222.42; CTRY:US; LANG:en; SCL:1; SRV:;
IPV:NLI; SFV:NSPM; H:mail-ua1-f42.google.com; PTR:mail-ua1-f42.google.com;
CAT:NONE;
SFS:(13230001)(4636009)(966005)(33964004)(508600001)(53546011)(166002)(70586007)(26005)(336012)(86362001)(68406010)(6862004)(4326008)(8676002)(2906002)(6666004)(55446002)(9686003)(83380400001)(5660300002)(786003)(316002)(42186006)(356005)(7596003)(7636003);
DIR:OUT; SFP:1102;
X-Auto-Response-Suppress: DR, OOF, AutoReply
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Apr 2022 17:54:10.0971 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: f8506dd5-c0e5-4143-5ef1-08da1988c8c5
X-MS-Exchange-CrossTenant-Id: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b
X-MS-Exchange-CrossTenant-AuthSource: DM6NAM11FT039.eop-nam11.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: Internet
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL0PR01MB5154
X-OriginatorOrg: mitprod.onmicrosoft.com
X-Content-Filtered-By: Mailman/MimeDel 2.1.34
X-BeenThere: kerberos@mit.edu
X-Mailman-Version: 2.1.34
Precedence: list
List-Id: The Kerberos Authentication System Mailing List <kerberos.mit.edu>
List-Unsubscribe: <https://mailman.mit.edu/mailman/options/kerberos>,
<mailto:kerberos-request@mit.edu?subject=unsubscribe>
List-Archive: <http://mailman.mit.edu/pipermail/kerberos/>
List-Post: <mailto:kerberos@mit.edu>
List-Help: <mailto:kerberos-request@mit.edu?subject=help>
List-Subscribe: <https://mailman.mit.edu/mailman/listinfo/kerberos>,
<mailto:kerberos-request@mit.edu?subject=subscribe>
X-Mailman-Original-Message-ID: <CAOdMLc3BvSqYFPEH7CoDim2yWH77GPBXYg=i-Xo4pnhyj+Drzg@mail.gmail.com>
X-Mailman-Original-References: <CAD-Ua_ifa=vo4PEzy3kx-5FB3J+hhN_2BTuS7O=E+hfudRbV4Q@mail.gmail.com>
<733bbe58-7c13-8abc-f0e6-3cbe979540ed@mit.edu>
 by: Chris Hecker - Fri, 8 Apr 2022 17:53 UTC

> Perhaps it would be nicer if one could create an empty in-memory profile
object and populate it with profile_add_relation(), but that is not
currently implemented.

I think I did it this way when I hacked my API in back in days of yore and
it was nice and clean. I’ll look when I’m at my computer.

Chris

On Thu, Apr 7, 2022 at 22:42 Greg Hudson <ghudson@mit.edu> wrote:

> On 4/7/22 16:19, Lars Francke wrote:
> > We tried to use kadm5_create_principal_3 and kadm5_randkey_principal_3
> but
> > we seem to be running into an issue. Ideally we'd like to call this
> > function with a handle (+ context) with an in-memory krb5.conf but that
> > does not seem to work so we create the files and refer to them in the
> > profile but kadmin still seems to load (is this related to the
> > "alt_profile"?) a file from a default location which means it'll use the
> > wrong connection details.
>
> krb5_init_context_profile() lets you supply a profile object. If this
> is created with profile_init_path(), the application should be able to
> strictly control which file is used.
>
> It is possible to create an in-memory profile with
> profile_init_vtable(). Perhaps it would be nicer if one could create an
> empty in-memory profile object and populate it with
> profile_add_relation(), but that is not currently implemented.
> ________________________________________________
> Kerberos mailing list Kerberos@mit.edu
> https://mailman.mit.edu/mailman/listinfo/kerberos
>

1
server_pubkey.txt

rocksolid light 0.9.8
clearnet tor