[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Different Heimdal/MIT behaviour of krb5_get_credentials ?




On Jun 1, 2007, at 12:00 PM, Markus Moeller wrote:

>
> "Henry B. Hotz" <hotz@jpl.nasa.gov> wrote in message
> 65054D89-41A4-4CA7-B6A1-9C5059848416@jpl.nasa.gov">news:65054D89-41A4-4CA7-B6A1-9C5059848416@jpl.nasa.gov...
>>
>> On May 31, 2007, at 11:25 AM, Markus Moeller wrote:
>>
>>> I have a AD forest with MM.COM with domains  
>>> DOM1.MM.COM,DOM2.MM.COM  and
>>> SUB.DOM2.MM.COM which all trust each other. To test the   
>>> availability of
>>> service tickets I created the following short program:
>>
>> Any particular reason you didn't use kvno (MIT) and kgetcred  
>> (Heimdal)?
>
> Not really, only I am not sure if it will achieve what I want.  My  
> final
> goal is to determine easily for a user/application if a domain has  
> trust to
> another. My thought was that the user does a kinit to his domain  
> DOM1 (or an
> application kinit against a keytab) and then tries to get a krbtgt  
> for the
> unknown domain DOM2. If he gets the tgt they have trust if not they  
> don't.
>
> Does this make sense ?

Sure it does.  You could do that with the utilities I listed too, but  
writing your own code you've got more visibility into what's happening.

I'm sure you realize it could fail for more reasons than just lack of  
a trust relationship also.  I've found I can't get away from these  
little hip-picket test programs when I need to debug things.  Name  
canonicalization and DNS (or NIS) interactions seem especially  
problematic in the real world for me.

------------------------------------------------------------------------
The opinions expressed in this message are mine,
not those of Caltech, JPL, NASA, or the US Government.
Henry.B.Hotz@jpl.nasa.gov, or hbhotz@oxy.edu