Rocksolid Light

Welcome to novaBBS (click a section below)

mail  files  register  newsreader  groups  login

Message-ID:  

"Open Channel D..." -- Napoleon Solo, The Man From U.N.C.L.E.


devel / comp.protocols.kerberos / Re: Question about Windows S4U support

SubjectAuthor
o Re: Question about Windows S4U supportKen Hornstein

1
Re: Question about Windows S4U support

<mailman.45.1699471051.2263420.kerberos@mit.edu>

  copy mid

https://www.novabbs.com/devel/article-flat.php?id=423&group=comp.protocols.kerberos#423

  copy link   Newsgroups: comp.protocols.kerberos
Path: i2pn2.org!i2pn.org!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!tncsrv06.tnetconsulting.net!.POSTED.mailman.mit.edu!not-for-mail
From: ken...@cmf.nrl.navy.mil (Ken Hornstein)
Newsgroups: comp.protocols.kerberos
Subject: Re: Question about Windows S4U support
Date: Wed, 08 Nov 2023 14:16:43 -0500
Organization: TNet Consulting
Lines: 30
Message-ID: <mailman.45.1699471051.2263420.kerberos@mit.edu>
References: <DM6PR07MB4651D6917435E9AF74528364BBA8A@DM6PR07MB4651.namprd07.prod.outlook.com>
<202311081916.3A8JGiOG013874@hedwig.cmf.nrl.navy.mil>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 8bit
Injection-Info: tncsrv06.tnetconsulting.net; posting-host="mailman.mit.edu:18.7.21.50";
logging-data="32717"; mail-complaints-to="newsmaster@tnetconsulting.net"
Cc: "kerberos@mit.edu" <kerberos@mit.edu>
To: JianJun Li <jjli@rocketsoftware.com>
DKIM-Filter: OpenDKIM Filter v2.11.0 unknown-host (unknown-jobid)
Authentication-Results: mailman.mit.edu;
dkim=pass (1024-bit key, unprotected) header.d=mitprod.onmicrosoft.com
header.i=@mitprod.onmicrosoft.com header.a=rsa-sha256
header.s=selector2-mitprod-onmicrosoft-com header.b=bG6wipeD;
dkim=pass (2048-bit key,
unprotected) header.d=nrl.navy.mil header.i=@nrl.navy.mil header.a=rsa-sha256
header.s=s2.dkim header.b=qA7Enxic
Authentication-Results: mit.edu; dmarc=pass (p=reject dis=none)
header.from=cmf.nrl.navy.mil
Authentication-Results: mit.edu; arc=pass smtp.remote-ip=18.7.73.15
ARC-Seal: i=2; a=rsa-sha256; d=mit.edu; s=arc; t=1699471048; cv=pass;
b=YR6RXOOAkreQvHGq1Mqor+RKQSQ7Hrj2Q1ZWC7C4qV/29hBD1113JJ/OlmPb1tfbz+2vCUOGUVUW4TI9S5n39w7g4i9gm9HeOMF540Zq99rUbK6YOfyWBTCjyISjBFdfFVoVv1iHDDtzQdMJPI4ZHFmRKadgS+bzdwEOF6NYq5UJxVPTMbffJwBDdPwc/H66DESRWEm+knMw99EZrdvOtMttgBBF/SIybaLxkf9CnDm75j+1bm7R3lU0zMHfkLcB6Ni6eCY5ToCHbfTq1TUtBuwZWwv2hZ6aVvTY1/05HrurdJAvmyKkd1tWASZEc4anzrTZuZw/N4Oq9go7lhatvQ==
ARC-Message-Signature: i=2; a=rsa-sha256; d=mit.edu; s=arc; t=1699471048;
c=relaxed/relaxed; bh=fkO97bq81GI74CK1z7qQOWmojOL+IuGMbcn/18yxzYk=;
h=Message-ID:From:Subject:MIME-Version:Content-Type:Date;
b=owK5I96GO/6aNLitMifjSF1OVJkzjv/SotZGx7zVPFxkTiBoyNhPC442nnuxVFwoimSvNfXjo0JDN3yemieFUPHzPmLUw9hopgmVLAULIuo8or0DaEqU0N53ivHoQuEEZI//pK7t3XNL3mk25iaxZlaKt5pXX/9UaCgupsxdEAipqrNtNr/msikaWJge1dgYambf9ROeHKBK1z6I96X/yhB6jCiqOhmKcmtxWhXjgVId76RyLiYPtnDknGBIqZPLdid0zDLacD10dbVpFzzj/pw+b55lDfd5fcpIxquKVut2UM5XOuzPA6B1MhGnWvkeARWTcZtIsnWpKmQza59LLw==
ARC-Authentication-Results: i=2; mit.edu; dkim=pass (1024-bit key;
unprotected) header.d=mitprod.onmicrosoft.com
header.i=@mitprod.onmicrosoft.com header.a=rsa-sha256
header.s=selector2-mitprod-onmicrosoft-com header.b=bG6wipeD;
dkim=pass (2048-bit key;
unprotected) header.d=nrl.navy.mil header.i=@nrl.navy.mil header.a=rsa-sha256
header.s=s2.dkim header.b=qA7Enxic
Authentication-Results: mit.edu; dkim=pass (1024-bit key;
unprotected) header.d=mitprod.onmicrosoft.com
header.i=@mitprod.onmicrosoft.com header.a=rsa-sha256
header.s=selector2-mitprod-onmicrosoft-com header.b=bG6wipeD;
dkim=pass (2048-bit key;
unprotected) header.d=nrl.navy.mil header.i=@nrl.navy.mil header.a=rsa-sha256
header.s=s2.dkim header.b=qA7Enxic
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
b=cNcyqyNYpcbboPCE96ro2UGnJrpD8RkfpaSed2NCe3TPF9MsldkrzNBQP4nhQaClbxAHsacgeBlc5ixcNR3CEMeEqbK3BDaA6ja6cqkJrm9VJ5hKgjY4uMgdQakY7GlM/3HMktLxQq1VXA8HACyWlvfbGJbNFfzGY0PlpTgklZFdJj3qakH6fI0oSYUk7CBEDOzEZ/r941ChGBUBitES+UXh6M0zL+4sZJKyyzjMI0fZjmYobwRCENHdUynBQ0fTwPydFynEOIM2cpF3uBkNqnb//kQskhKRXVoATjPgAgJJF4UsILPVB5rUVFkHnErnrZ+wfDpOJuaykEARbVubKw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
s=arcselector9901;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
bh=fkO97bq81GI74CK1z7qQOWmojOL+IuGMbcn/18yxzYk=;
b=NJvCBn5Bl/mw2LqKYE4033ximlLqU5t81FBV1VvAThCg5Ttp53E5VsKM47kLnfj0obYHtp3RrbQtPkmt+n7Ht9R45jFQm9ueXMCcTHm5+tLP5VkG99+N436JsLFmTTk470Hn9f0BG2R2oPjDzRcrNnjWSoIzvGlDhBcZoWCblPfvMTdb/0L0GX+CJuZChgTFAXCAIhzx5bwkZzVLq27r6b8r/xoQIDD5EzPeoYllLAqcXCBdP9L6FHAcQNUBd6hkFIufs8iYk6umvSMrp/qREKHofwiIDZFgav/DFsgoGboRont7I0omgyBEKQbg7gJf6MzN6SeV5GOgYpWQzzAvUw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
140.32.59.234) smtp.rcpttodomain=mit.edu smtp.mailfrom=cmf.nrl.navy.mil;
dmarc=pass (p=reject sp=reject pct=100) action=none
header.from=cmf.nrl.navy.mil; dkim=pass (signature was verified)
header.d=nrl.navy.mil; arc=none (0)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=mitprod.onmicrosoft.com; s=selector2-mitprod-onmicrosoft-com;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
bh=fkO97bq81GI74CK1z7qQOWmojOL+IuGMbcn/18yxzYk=;
b=bG6wipeDMcvN6Gya8+D1QmUjGfqgr3Guv5TN6EVsc6o9m41EmZSpizPwcegT8YIeHnngWIplwW/7iyckYjcDSUYJIMJTWjol8WyC7XO35aJlUrC77Yy3DHmED8XAmCFCASWQ7Ag1JOAwwJkCe9fhjytfd1AT2KY4Fk5DsLlajLg=
Authentication-Results: spf=pass (sender IP is 140.32.59.234)
smtp.mailfrom=cmf.nrl.navy.mil; dkim=pass (signature was verified)
header.d=nrl.navy.mil;dmarc=pass action=none header.from=cmf.nrl.navy.mil;
Received-SPF: Pass (protection.outlook.com: domain of cmf.nrl.navy.mil
designates 140.32.59.234 as permitted sender)
receiver=protection.outlook.com; client-ip=140.32.59.234; helo=mf.dren.mil;
pr=C
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nrl.navy.mil;
h=message-id : from :
to : cc : subject : in-reply-to : references : mime-version : content-type
: content-transfer-encoding : date; s=s2.dkim;
bh=fkO97bq81GI74CK1z7qQOWmojOL+IuGMbcn/18yxzYk=;
b=qA7EnxicSUhvreTnFq4x2T/tJ8xtLYgOafI5sTmn6y+qomeg5BvrerUzwAVtXVmelQS/
NtgMtZvUp/gYHfS+UEmDjsbEiYHiaZBUYJNTKM/vTRZ33EA8VHF0lGEWB6LZjTyJtc4N
au08Hs5vDHIre+zKbhRdMPmDJ/drxxNZuc2uLE/3UUKgXxoc3D6HojgeAvBNfiyve3f4
LbjimETveOWSS1kc1kL4fhlEyafc0thQnF6WvDaEe3tM6bCFPqXX9JTMY41Tp1k9e4h1
kJPeReftnMZSD/XZHBTuHdwKJUZvpfMH/FUT1EkFFygIfTXz8lsqPwoJgyaa2Z87oz6I Pg==
In-Reply-To: <DM6PR07MB4651D6917435E9AF74528364BBA8A@DM6PR07MB4651.namprd07.prod.outlook.com>
X-Face: "Evs"_GpJ]],xS)b$T2#V&{KfP_i2`TlPrY$Iv9+TQ!6+`~+l)#7I)0xr1>4hfd{#0B4
WIn3jU;bql;{2Uq%zw5bF4?%F&&j8@KaT?#vBGk}u07<+6/`.F-3_GA@6Bq5gN9\+s;_d
gD\SW #]iN_U0 KUmOR.P<|um5yP<ea#^"SJK;C*}fMI;Mv(aiO2z~9n.w?@\>kEpSD@*e`
X-NRLCMF-Spam-Score: () hits=0 User Authenticated
X-NRLCMF-Virus-Scanned:
X-EOPAttributedMessage: 0
X-EOPTenantAttributedMessage: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b:0
X-MS-PublicTrafficType: Email
X-MS-TrafficTypeDiagnostic: CY4PEPF0000E9D9:EE_|DM8PR01MB7126:EE_
X-MS-Office365-Filtering-Correlation-Id: 388ae5dd-1487-4312-31c8-08dbe08f4061
X-LD-Processed: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b,ExtAddr
X-MS-Exchange-AtpMessageProperties: SA
X-MS-Exchange-SenderADCheck: 0
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: K1JanAp60SlwCs37tLPfuVgfRHZLm4YCqQaFwgnziaoUGYU37aKmW0EaEdbJ193+exRP0+1ABFAz9TTgA3eE9Aa+ru34JJNfQRKMhBmhJClBqoXmGd5I1G8StMBxNKGkNAsU1qCrF6QKWZKN+/HOYQ/5zZenBvTTIzVqmkMVuQS9MhXic1qsqjEYz/06OgkWW/AMAjCLNxvosvB7I/zWApqLnL8gvvZkRXUqOUvQOsoLneTifD2XFV9Uw2ZMUMOhQ2a/HcnuRgBYifr6mqx5DOIJ5tvheA4wJbiVzrnxb4yGq3uEcGIFX4Z4rgzKBsFJJT4kR3LVGUN7fhE7uUW4I1dN9w0pb2KnrCErG54MtYFJ62VO4NYxBhmqi8bfoX1VoA0O9DZ7JYMd+JR7WaR3mExUCKnrYAx+N7Nt9UgT7bQa4G0u3hrURIjOfrSuPP2ryxV/rIa0ipn3KGV7ZjOMCMlOCCKLA0fUcj6EFRW6VNXoy0hlaHrE7uStZnc/b63KdRzCXVwkJXUx6SuVYlajDuCHuHRBtqucKlkeKdNXD60hjA1ozpeITIfDSobDI6eIhwmFsnb9eG0sqNdxh7fIFmDd2hKDp9jmrUfZaCNvIGdbeK2RvUJSpEFezwBysys7HWqTDL1Ql/4z+tSQH7mqOOwttStWtQY7yDVDU346hLyNwjF0JF3Se8CD0djp5EIWYFi83YK5GIDrLa/FEyl5Vw==
X-Forefront-Antispam-Report: CIP:140.32.59.234; CTRY:US; LANG:en; SCL:1; SRV:;
IPV:NLI; SFV:NSPM; H:mf.dren.mil; PTR:mfe.dren.mil; CAT:NONE;
SFS:(13230031)(4636009)(376002)(136003)(39860400002)(396003)(346002)(61400799006)(451199024)(48200799006)(64100799003)(5660300002)(2906002)(86362001)(786003)(316002)(68406010)(8676002)(70586007)(4326008)(956004)(1076003)(26005)(83380400001)(6862004)(336012)(426003)(7636003)(356005)(498600001);
DIR:OUT; SFP:1102;
X-Auto-Response-Suppress: DR, OOF, AutoReply
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Nov 2023 19:16:46.6238 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 388ae5dd-1487-4312-31c8-08dbe08f4061
X-MS-Exchange-CrossTenant-Id: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b
X-MS-Exchange-CrossTenant-AuthSource: CY4PEPF0000E9D9.namprd05.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: Internet
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM8PR01MB7126
X-OriginatorOrg: mitprod.onmicrosoft.com
X-MIME-Autoconverted: from quoted-printable to 8bit by mailman.mit.edu id
3A8JHTIN1682341
X-BeenThere: kerberos@mit.edu
X-Mailman-Version: 2.1.34
Precedence: list
List-Id: The Kerberos Authentication System Mailing List <kerberos.mit.edu>
List-Unsubscribe: <https://mailman.mit.edu/mailman/options/kerberos>,
<mailto:kerberos-request@mit.edu?subject=unsubscribe>
List-Archive: <http://mailman.mit.edu/pipermail/kerberos/>
List-Post: <mailto:kerberos@mit.edu>
List-Help: <mailto:kerberos-request@mit.edu?subject=help>
List-Subscribe: <https://mailman.mit.edu/mailman/listinfo/kerberos>,
<mailto:kerberos-request@mit.edu?subject=subscribe>
X-Mailman-Original-Message-ID: <202311081916.3A8JGiOG013874@hedwig.cmf.nrl.navy.mil>
X-Mailman-Original-References: <DM6PR07MB4651D6917435E9AF74528364BBA8A@DM6PR07MB4651.namprd07.prod.outlook.com>
 by: Ken Hornstein - Wed, 8 Nov 2023 19:16 UTC

I am DEFINITELY not an expert in S4U* nor Windows APIs, but I have
looked into this a BIT and I can give you some thoughts.

>Now we wants to switch from Windows AD to MIT KDC. Currently windows
>can be authenticated by MIT KDC without any problem but Windows API
>LSALogonUser() in our application fails.

It should be noted that up front that there are some caveats to MIT
Kerberos S4U support. The specific one that I am aware of is that
you cannot use the db2 database (the default) as the KDC backend;
you need to use the LDAP KDB module and configure a special attribute
called "krbAllowedToDelegateTo" to configure a service principal to
permit S4U2Self. I am not sure this is relevant to this discussion
though.

>Nov 03 14:01:40 niuniu krb5kdc[13724](info): TGS_REQ (5 etypes {aes256-cts-hmac-sha1-96(18), aes128-cts-hmac-sha1-96(17), DEPRECATED:arcfour-hmac(23), DEPRECATED:arcfour-hmac-exp(24), UNSUPPORTED:(-135)}) 192.168.0.5: LOOKING_UP_SERVER: authtime 0, host/win11client.mylab.com@MYLAB.COM<mailto:host/win11client.mylab.com@MYLAB.COM> for host\/win11client.mylab.com@MYLAB.COM, Server not found in Kerberos database

It's important to understand that INTERALLY Kerberos principals are
represented as a sequence of one or more strings and a realm. So while
you may see a principal in the form of "host/win11client@MYLAB.COM"
that's just the user representation. Really that's encoded on the wire
as the strings "host" and "win11client", and the realm MYLAB.COM. If
MIT Kerberos is displaying that as "host\/win11client@MYLAB.COM", then that
means it's getting ONE string for that principal that contains
"host/win11client" (the '/' is the traditional separator for strings
in a Kerberos principal). I have no idea why that is happening, but
that suggests to me that there is some problem on the client side.

--Ken

1
server_pubkey.txt

rocksolid light 0.9.8
clearnet tor