Search squid archive

Re: Re: Re: squid_kerb_auth on mac os x

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



With Windows 2003 SP2 you can set a flag (I think in
UserAccountControl property) for the computer account that stops AD from
adding the group-information to the service-ticket. I found it
somewhere in their knowledgebase, but currently don't remember the
details.
I have been searching for quite some time because I had the same problem
with too large tickets. Now it's working.



On Fri, 27 Jun 2008 20:07:41 +0100
"Markus Moeller" <huaraz@xxxxxxxxxxxxxxxx> wrote:

> Brian,
> 
>  the read buffer in squid_kerb_auth is 6400 which I think should be 
> increased to 8192 the value used in squid for writing.  The ticket is 
> usually only that big for users which are members of hundreds of Windows 
> Groups, which I have never seen before to be > 4k.
> 
> Can you try to increase in the main function the buffer buf to 8192 ?
> 
> Markus
> 
> 
> "Brian Kirk" <bekirk@xxxxxxxxx> wrote in message 
> news:6ac1d44b0806271019t5ceef29di99902b366fcc21d4@xxxxxxxxxxxxxxxxx
> >I am going through a simular nightmare in our environment,  we
> > currently use NTLM auth and since we have over 6000 Internet users
> > this isn't very efficent. I can't get kerberos to work.  I used the
> > ./squid_kerb_auth_test program to generate the blob, and it is over
> > 5000 characters long.  The squid_kerb_auth seems limited to 4096, am I
> > going the have to alter squid_kerb_auth code or am I doing something
> > wrong to get that big of a blob?
> >
> > On 6/7/08, Markus Moeller <huaraz@xxxxxxxxxxxxxxxx> wrote:
> >> Find below a small test program to create a token.  Run a kinit as a user
> >> and then ./squid_kerb_auth_test  proxy_fqdn. It creates a token like:
> >>
> >> ./squid_kerb_auth_test opensuse.suse.home
> >> Token:
> >> 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
> >>
> >> Then set the keytab with  export
> >> KRB5_KTNAME=FILE:/etc/squid/squid.keytab and run
> >> ./squid_kerb_auth -d -i -s HTTP/proxy_fqdn and enter the token starting 
> >> with
> >> YR as follows (in one line)
> >>
> >> ./squid_kerb_auth -d -i -s
> >> HTTP/opensuse.suse.home@xxxxxxxxx
> >> YR
> >> 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
> >> 2008/06/07 22:52:11| squid_kerb_auth: Got 'YR
> >> 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'
> >> from squid (length: 691).
> >> 2008/06/07 22:52:12| squid_kerb_auth: parseNegTokenInit failed with 
> >> rc=109
> >> 2008/06/07 22:52:12| squid_kerb_auth: Token is possibly a GSSAPI token
> >> AF AA== markus@xxxxxxxxx
> >> 2008/06/07 22:52:12| squid_kerb_auth: AF AA== markus@xxxxxxxxx
> >> 2008/06/07 22:52:12| squid_kerb_auth: User markus@xxxxxxxxx authenticated
> >>
> >>
> >> Regards
> >> Markus
> >>
> >> Compile gcc -o squid_kerb_auth_test squid_kerb_auth_test.c -lgssapi_krb5
> >> -lkrb5
> >>
> >> /*
> >> *
> >> -----------------------------------------------------------------------------
> >> *
> >> * Author: Markus Moeller (markus_moeller at compuserve.com)
> >> *
> >> * Copyright (C) 2007 Markus Moeller. All rights reserved.
> >> *
> >> *   This program is free software; you can redistribute it and/or modify
> >> *   it under the terms of the GNU General Public License as published by
> >> *   the Free Software Foundation; either version 2 of the License, or
> >> *   (at your option) any later version.
> >> *
> >> *   This program is distributed in the hope that it will be useful,
> >> *   but WITHOUT ANY WARRANTY; without even the implied warranty of
> >> *   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
> >> *   GNU General Public License for more details.
> >> *
> >> *   You should have received a copy of the GNU General Public License
> >> *   along with this program; if not, write to the Free Software
> >> *   Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307,
> >> USA.
> >> *
> >> *
> >> -----------------------------------------------------------------------------
> >> */
> >> /*
> >> * Hosted at http://sourceforge.net/projects/squidkerbauth
> >> */
> >>
> >> #ifndef HEIMDAL
> >> #include <profile.h>
> >> #endif
> >> #include <krb5.h>
> >>
> >> #include <unistd.h>
> >> #include <stdlib.h>
> >> #include <stdio.h>
> >> #include <string.h>
> >> #include <errno.h>
> >> #include <time.h>
> >> #include <sys/time.h>
> >>
> >> #ifdef HEIMDAL
> >> #include <gssapi.h>
> >> #define gss_nt_service_name GSS_C_NT_HOSTBASED_SERVICE
> >> #else
> >> #include <gssapi/gssapi.h>
> >> #ifndef SOLARIS_11
> >> #include <gssapi/gssapi_generic.h>
> >> #else
> >> #define gss_nt_service_name GSS_C_NT_HOSTBASED_SERVICE
> >> #endif
> >> #endif
> >>
> >> static const char *LogTime(void);
> >>
> >> int check_gss_err(OM_uint32 major_status, OM_uint32 minor_status, const
> >> char* function);
> >>
> >> #define PROGRAM "squid_kerb_auth_test"
> >>
> >> static const char *LogTime()
> >> {
> >>   struct tm *tm;
> >>   struct timeval now;
> >>   static time_t last_t = 0;
> >>   static char buf[128];
> >>
> >>   gettimeofday(&now, NULL);
> >>   if (now.tv_sec != last_t) {
> >>       tm = localtime(&now.tv_sec);
> >>       strftime(buf, 127, "%Y/%m/%d %H:%M:%S", tm);
> >>       last_t = now.tv_sec;
> >>   }
> >>   return buf;
> >> }
> >>
> >> #ifdef HAVE_SPNEGO
> >> #ifndef gss_mech_spnego
> >> static gss_OID_desc _gss_mech_spnego  = {6, (void
> >> *)"\x2b\x06\x01\x05\x05\x02"};
> >> gss_OID gss_mech_spnego = &_gss_mech_spnego;
> >> #endif
> >> #endif
> >>
> >> int check_gss_err(OM_uint32 major_status, OM_uint32 minor_status, const
> >> char* function){
> >>  if (GSS_ERROR(major_status)) {
> >>   OM_uint32 maj_stat,min_stat;
> >>   OM_uint32 msg_ctx = 0;
> >>   gss_buffer_desc status_string;
> >>   char buf[1024];
> >>   size_t len;
> >>
> >>   len = 0;
> >>   msg_ctx = 0;
> >>   while (!msg_ctx) {
> >>     /* convert major status code (GSS-API error) to text */
> >>     maj_stat = gss_display_status(&min_stat, major_status,
> >>                                   GSS_C_GSS_CODE,
> >>                                   GSS_C_NULL_OID,
> >>                                   &msg_ctx, &status_string);
> >>     if (maj_stat == GSS_S_COMPLETE) {
> >>       if (sizeof(buf) > len + status_string.length + 1) {
> >>         sprintf(buf+len, "%s", (char*) status_string.value);
> >>         len += status_string.length;
> >>       }
> >>       gss_release_buffer(&min_stat, &status_string);
> >>       break;
> >>     }
> >>     gss_release_buffer(&min_stat, &status_string);
> >>   }
> >>   if (sizeof(buf) > len + 2) {
> >>     sprintf(buf+len, "%s", ". ");
> >>     len += 2;
> >>   }
> >>   msg_ctx = 0;
> >>   while (!msg_ctx) {
> >>     /* convert minor status code (underlying routine error) to text */
> >>     maj_stat = gss_display_status(&min_stat, minor_status,
> >>                                   GSS_C_MECH_CODE,
> >>                                   GSS_C_NULL_OID,
> >>                                   &msg_ctx, &status_string);
> >>     if (maj_stat == GSS_S_COMPLETE) {
> >>       if (sizeof(buf) > len + status_string.length ) {
> >>         sprintf(buf+len, "%s", (char*) status_string.value);
> >>         len += status_string.length;
> >>       }
> >>       gss_release_buffer(&min_stat, &status_string);
> >>       break;
> >>     }
> >>     gss_release_buffer(&min_stat, &status_string);
> >>   }
> >>   fprintf(stderr, "%s| %s: %s failed: %s\n", LogTime(), PROGRAM, 
> >> function,
> >> buf);
> >>   return(1);
> >>  }
> >>  return(0);
> >> }
> >>
> >> static void base64_init(void);
> >>
> >> static int base64_initialized = 0;
> >> #define BASE64_VALUE_SZ 256
> >> #define BASE64_RESULT_SZ 8192
> >> int base64_value[BASE64_VALUE_SZ];
> >> const char base64_code[] =
> >> "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/";
> >>
> >> static void
> >> base64_init(void)
> >> {
> >>   int i;
> >>
> >>   for (i = 0; i < BASE64_VALUE_SZ; i++)
> >>       base64_value[i] = -1;
> >>
> >>   for (i = 0; i < 64; i++)
> >>       base64_value[(int) base64_code[i]] = i;
> >>   base64_value['='] = 0;
> >>
> >>   base64_initialized = 1;
> >> }
> >>
> >> char *
> >> base64_decode(const char *p)
> >> {
> >>   static char result[BASE64_RESULT_SZ];
> >>   int j;
> >>   int c;
> >>   long val;
> >>   if (!p)
> >>       return NULL;
> >>   if (!base64_initialized)
> >>       base64_init();
> >>   val = c = 0;
> >>   for (j = 0; *p && j + 4 < BASE64_RESULT_SZ; p++) {
> >>       unsigned int k = ((unsigned char) *p) % BASE64_VALUE_SZ;
> >>       if (base64_value[k] < 0)
> >>           continue;
> >>       val <<= 6;
> >>       val += base64_value[k];
> >>       if (++c < 4)
> >>           continue;
> >>       /* One quantum of four encoding characters/24 bit */
> >>       result[j++] = val >> 16;        /* High 8 bits */
> >>       result[j++] = (val >> 8) & 0xff;        /* Mid 8 bits */
> >>       result[j++] = val & 0xff;       /* Low 8 bits */
> >>       val = c = 0;
> >>   }
> >>   result[j] = 0;
> >>   return result;
> >> }
> >>
> >> /* adopted from
> >> http://ftp.sunet.se/pub2/gnu/vm/base64-encode.c with
> >> adjustments */
> >> const char *
> >> base64_encode(const char *decoded_str)
> >> {
> >>   static char result[BASE64_RESULT_SZ];
> >>   int bits = 0;
> >>   int char_count = 0;
> >>   int out_cnt = 0;
> >>   int c;
> >>
> >>   if (!decoded_str)
> >>       return decoded_str;
> >>
> >>   if (!base64_initialized)
> >>       base64_init();
> >>
> >>   while ((c = (unsigned char) *decoded_str++) && out_cnt < 
> >> sizeof(result) -
> >> 5) {
> >>       bits += c;
> >>       char_count++;
> >>       if (char_count == 3) {
> >>           result[out_cnt++] = base64_code[bits >> 18];
> >>           result[out_cnt++] = base64_code[(bits >> 12) & 0x3f];
> >>           result[out_cnt++] = base64_code[(bits >> 6) & 0x3f];
> >>           result[out_cnt++] = base64_code[bits & 0x3f];
> >>           bits = 0;
> >>           char_count = 0;
> >>       } else {
> >>           bits <<= 8;
> >>       }
> >>   }
> >>   if (char_count != 0) {
> >>       bits <<= 16 - (8 * char_count);
> >>       result[out_cnt++] = base64_code[bits >> 18];
> >>       result[out_cnt++] = base64_code[(bits >> 12) & 0x3f];
> >>       if (char_count == 1) {
> >>           result[out_cnt++] = '=';
> >>           result[out_cnt++] = '=';
> >>       } else {
> >>           result[out_cnt++] = base64_code[(bits >> 6) & 0x3f];
> >>           result[out_cnt++] = '=';
> >>       }
> >>   }
> >>   result[out_cnt] = '\0';     /* terminate */
> >>   return result;
> >> }
> >>
> >> /* adopted from
> >> http://ftp.sunet.se/pub2/gnu/vm/base64-encode.c with
> >> adjustments */
> >> const char *
> >> base64_encode_bin(const char *data, int len)
> >> {
> >>   static char result[BASE64_RESULT_SZ];
> >>   int bits = 0;
> >>   int char_count = 0;
> >>   int out_cnt = 0;
> >>
> >>   if (!data)
> >>       return data;
> >>
> >>   if (!base64_initialized)
> >>       base64_init();
> >>
> >>   while (len-- && out_cnt < sizeof(result) - 5) {
> >>       int c = (unsigned char) *data++;
> >>       bits += c;
> >>       char_count++;
> >>       if (char_count == 3) {
> >>           result[out_cnt++] = base64_code[bits >> 18];
> >>           result[out_cnt++] = base64_code[(bits >> 12) & 0x3f];
> >>           result[out_cnt++] = base64_code[(bits >> 6) & 0x3f];
> >>           result[out_cnt++] = base64_code[bits & 0x3f];
> >>           bits = 0;
> >>           char_count = 0;
> >>       } else {
> >>           bits <<= 8;
> >>       }
> >>   }
> >>   if (char_count != 0) {
> >>       bits <<= 16 - (8 * char_count);
> >>       result[out_cnt++] = base64_code[bits >> 18];
> >>       result[out_cnt++] = base64_code[(bits >> 12) & 0x3f];
> >>       if (char_count == 1) {
> >>           result[out_cnt++] = '=';
> >>           result[out_cnt++] = '=';
> >>       } else {
> >>           result[out_cnt++] = base64_code[(bits >> 6) & 0x3f];
> >>           result[out_cnt++] = '=';
> >>       }
> >>   }
> >>   result[out_cnt] = '\0';     /* terminate */
> >>   return result;
> >> }
> >> const char *squid_kerb_proxy_auth(char* principal_name, char *proxy) {
> >> int rc=0;
> >> OM_uint32 major_status, minor_status;
> >> gss_ctx_id_t          gss_context = GSS_C_NO_CONTEXT;
> >> gss_name_t            server_name = GSS_C_NO_NAME;
> >> gss_buffer_desc       service = GSS_C_EMPTY_BUFFER;
> >> gss_buffer_desc       input_token = GSS_C_EMPTY_BUFFER;
> >> gss_buffer_desc       output_token = GSS_C_EMPTY_BUFFER;
> >> const char   *token = NULL;
> >>
> >>  setbuf(stdout,NULL);
> >>  setbuf(stdin,NULL);
> >>
> >>  if (!proxy ) {
> >>    fprintf(stderr, "%s| %s: Error: No proxy server name\n", LogTime(),
> >> PROGRAM);
> >>    return NULL;
> >>  }
> >>
> >>  service.value = malloc(strlen("HTTP")+strlen(proxy)+2);
> >> snprintf(service.value,strlen("HTTP")+strlen(proxy)+2,"%s@%s","HTTP",proxy);
> >>  service.length = strlen((char *)service.value);
> >>
> >>  major_status = gss_import_name(&minor_status, &service,
> >>                                gss_nt_service_name, &server_name);
> >>
> >>  if
> >> (check_gss_err(major_status,minor_status,"gss_import_name()")
> >> )
> >>     goto cleanup;
> >>
> >>  major_status = gss_init_sec_context(&minor_status,
> >>                                     GSS_C_NO_CREDENTIAL,
> >>                                     &gss_context,
> >>                                     server_name,
> >> #ifdef HAVE_SPNEGO
> >>                                     gss_mech_spnego,
> >> #else
> >>                                     0,
> >> #endif
> >>                                     0,
> >>                                     0,
> >>                                     GSS_C_NO_CHANNEL_BINDINGS,
> >>                                     &input_token,
> >>                                     NULL,
> >>                                     &output_token,
> >>                                     NULL,
> >>                                     NULL);
> >>
> >>  if
> >> (check_gss_err(major_status,minor_status,"gss_init_sec_context()")
> >> )
> >>     goto cleanup;
> >>
> >>  if (output_token.length) {
> >>
> >>     token = (const char*)base64_encode_bin((const
> >> char*)output_token.value,output_token.length);
> >>  }
> >>
> >>
> >> cleanup:
> >>  gss_delete_sec_context(&minor_status, &gss_context, NULL);
> >>  gss_release_buffer(&minor_status, &service);
> >>  gss_release_buffer(&minor_status, &input_token);
> >>  gss_release_buffer(&minor_status, &output_token);
> >>  gss_release_name(&minor_status, &server_name);
> >>
> >>  return token;
> >> }
> >>
> >> int main(int argc, char *argv[]) {
> >>
> >>  const char *Token;
> >>
> >>  if (argc < 1) {
> >>      fprintf(stderr, "%s| %s: Error: No proxy server name given\n",
> >> LogTime(), PROGRAM);
> >>      exit(99);
> >>  }
> >>  Token = (const char *)squid_kerb_proxy_auth(NULL,argv[1]);
> >>  fprintf(stdout,"Token: %s\n",Token?Token:"NULL");
> >>
> >>  exit(0);
> >> }
> >>
> >>
> >>
> >>
> >>
> >>
> >>
> >> "Markus Moeller" <huaraz@xxxxxxxxxxxxxxxx> wrote in message
> >> news:g2c9kv$5vc$1@xxxxxxxxxxxxxxxx
> >>
> >> > I can create a simple test tool to create blobs. I will post it later 
> >> > next
> >> week.
> >> >
> >> > Markus
> >> >
> >> > "Henrik Nordstrom" <henrik@xxxxxxxxxxxxxxxxxxx> wrote in message
> >> news:1212619464.15703.1.camel@xxxxxxxxxxxxxxxxxxxxxx
> >> >
> >> > > On ons, 2008-06-04 at 15:41 -0700, Alex Morken wrote:
> >> > >
> >> > >
> >> > > > Thank you Henrik.  I kind of figured it needed something else, but 
> >> > > > I
> >> > > > wasn't sure what to put there.  Where can I get or generate the
> >> > > > Kerberos GSSAPI blob I need for the input?  I have been digging
> >> > > > around kerberos docs and haven't found what I needed.
> >> > > >
> >> > >
> >> > > Not sure. It's a kerberos authentication handshake, and initially
> >> > > depends on a challenge sent by the helper...
> >> > >
> >> > > Regards
> >> > > Henrik
> >> > >
> >> > >
> >> > >
> >> >
> >> >
> >> >
> >> >
> >>
> >>
> >>
> > 
> 
> 


-- 
---------------------------------------
Malte Schröder
MalteSch@xxxxxx
ICQ# 68121508
---------------------------------------

Attachment: signature.asc
Description: PGP signature


[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux