Hi Markus,
Using firefox at windows machine (not domain member)
- kerbtray don't show any credentials
- I don't have traffic at port 88.
- Don't work.
Using IE8 at windows machine (not domain member)
- kerbtray don't show any credentials
- At port 88 there are a TGS-REQ and a TGS-REP
- It works
Using firefox at windows machine (domain member of windows server)
- kerbtray show me the user principal and the service principal
HTTP/squid.domain.
- At port 88 there are a TGS-REQ and a TGS-REP
- It works
Using IE8 at windows machine (domain member of windows server)
- kerbtray show me the user principal and the service principal
HTTP/squid.domain.
- At port 88 there are a TGS-REQ and a TGS-REP
- It works
Regards
Jose
Markus Moeller wrote:
Hi Jose
Can you install kerbtray from the resource kit
http://www.microsoft.com/downloads/details.aspx?FamilyID=9D467A69-57FF-4AE7-96EE-B18C4790CFFD&displaylang=en
and start it ? It should list if you have got a TGS for
HTTP/squid.domain.
Also can you capture port 88(Kerberos) traffic on the client with
wireshark ? When you login you should see an AS REQ and REP and
when firefox authenticates to the proxy you should se a TGS REQ
for HTTP/squid.domain.
If not can you send me the capture to have a look at it ?
Regards Markus
"Jose Lopes" <jlopes@xxxxxxxxxxxxxx> wrote in message
news:4B5596BB.8010103@xxxxxxxxxxxxxxxxx
Hi,
I have the same problem. I have already set
network.negotiate-auth.trusted-uris to proxy domain. At the
firefox (FF) log appears: 0[825140]: service = squid.domain
0[825140]: using negotiate-sspi 0[825140]: nsAuthSSPI::Init
0[825140]: InitSSPI 0[825140]: Using SPN of [HTTP/squid.domain]
0[825140]: nsHttpNegotiateAuth::GenerateCredentials()
[challenge=Negotiate] 0[825140]: entering
nsAuthSSPI::GetNextToken() 0[825140]: Sending a token of length
40 0[825140]: nsHttpNegotiateAuth::GenerateCredentials()
[challenge=Negotiate] 0[825140]: entering
nsAuthSSPI::GetNextToken() 0[825140]: Cannot restart
authentication sequence!
The http messages between squid an FF are:
FF -> SQUID GET http://www.squid-cache.org/ HTTP/1.1 [...]
SQUID -> FF HTTP/1.0 407 Proxy Authentication Required Server:
squid/3.0.STABLE14 [...] Proxy-Authenticate: Negotiate [...]
FF -> SQUID GET http://www.squid-cache.org/ HTTP/1.1 [...]
Proxy-Authorization: Negotiate
TlRMTVNTUAABAAAAB4IIogAAAAAAAAAAAAAAAAAAAAAFASgKAAAADw==
SQUID -> FF HTTP/1.0 407 Proxy Authentication Required Server:
squid/3.0.STABLE14 [...] Proxy-Authenticate: Negotiate [...]
I have already IE working, and the http seems similar.
IE -> SQUID GET http://www.squid-cache.org/ HTTP/1.1 [...]
SQUID -> IE HTTP/1.0 407 Proxy Authentication Required Server:
squid/3.0.STABLE14 [...] Proxy-Authenticate: Negotiate [...]
IE -> SQUID GET http://www.squid-cache.org/ HTTP/1.1 [...]
Proxy-Authorization: Negotiate
TlRMTVNTUAABAAAAB4IIogAAAAAAAAAAAAAAAAAAAAAFASgKAAAADw==
SQUID -> IE HTTP/1.0 407 Proxy Authentication Required Server:
squid/3.0.STABLE14 [...] Proxy-Authenticate: Negotiate [...]
IE -> SQUID GET http://www.squid-cache.org/ HTTP/1.1 [...]
Proxy-Authorization: Negotiate
YIIE+gYGKwYBBQUCoIIE7jCCBOqgJDAiBgkqhkiC9xIBAgIGC[...] [...]
SQUID -> IE HTTP/1.0 200 OK [...] Proxy-Authentication-Info:
Negotiate oYGgMIGdoAMKAQChCwYJKoZIgvcSAQICoo[...] [...]
Seems like at first IE use NTLM and at second use kerberos.
I think FF is similar, but FF don't allow the second iteration.
How can I put kerberos as first iteration?
Thanks in advance Regards Jose
Markus Moeller wrote:
The message parseNegTokenInit failed with rc=102 just means the
token is not a GSSAPI token wrapped in a SPNEGO token, but a
plain GSSAPI token. When you use firefox you have to do a kinit
first to store the AS token in the Kerberos cache for Firefox
to use and I think Firfox has to be configured with
network.negotiate-auth.trusted-uris to be set to the domains of
your proxy server.
Regards Markus
"Umesh Bodalina" <u.bodalina@xxxxxxxxx> wrote in message
news:c3b47c041001181054n7091ea3aj761a508938de74e3@xxxxxxxxxxxxxxxxx
Hi Markus Sorry yes you were right, it was DNS.
In our environment we are running two DNS servers. One using MS
DNS and the other using unix BIND. The linux server was added
to the unix DNS (with name proxy1.domain.com) but not to the MS
DNS which was authority for ad.domain.com. Now that I think
about it our MS DNS has issues doing reverse lookups for IPs
that the unix DNS is authority for (which in this case was
proxy1.domain.com).
I changed linux server name to proxy1.ad.domain.com and now the
squid_kerb_auth_test works. Using your squid_kerb_auth
(version 1.0.5) I get: AF oRQwEqADCgEAoQsGCSqGSIb3EgECAg==
user@xxxxxxxxxxxxx 2010/01/18 20:25:10| squid_kerb_auth: AF
oRQwEqADCgEAoQsGCSqGSIb3EgECAg== user@xxxxxxxxxxxxx When I try
the same thing with the auth from squid-2.7.STABLE7.tar.bz2 I
get 2010/01/18 20:29:07| squid_kerb_auth: parseNegTokenInit
failed with rc=102 AF oRQwEqADCgEAoQsGCSqGSIb3EgECAg==
user@xxxxxxxxxxxxx 2010/01/18 20:29:07| squid_kerb_auth: AF
oRQwEqADCgEAoQsGCSqGSIb3EgECAg== user@xxxxxxxxxxxxx Is the
parseNegTokenInit failed with rc=102 ok?
I then tried running squid and used Firefox 3.5.7. I got the
following error from squid cache:
authenticateNegotiateHandleReply: Failed validating user via
Negotiate. Error returned 'type 1 NTLM token'
Any ideas? Also I don't get any authentication popups for
userid and password...
A sample of the log: 2010/01/18 20:47:58| squid_kerb_auth: Got
'YR TlRMTVNTUAABAAAAB4IIogAAAAAAAAAAAAAAAAAAAAAFASgKAAAADw=='
from squid (length: 59). 2010/01/18 20:47:58| squid_kerb_auth:
parseNegTokenInit failed with rc=101 2010/01/18 20:47:58|
squid_kerb_auth: received type 1 NTLM token 2010/01/18
20:47:58| do_comm_select: 1 fds ready 2010/01/18 20:47:58|
cbdataValid: 0x1838d448 2010/01/18 20:47:58|
helperStatefulHandleRead: 30 bytes from negotiateauthenticator
#1. 2010/01/18 20:47:58| commSetSelect: FD 7 type 1 2010/01/18
20:47:58| helperStatefulHandleRead: end of reply found
2010/01/18 20:47:58| cbdataValid: 0x18648bb8 2010/01/18
20:47:58| cbdataValid: 0x185cad18 2010/01/18 20:47:58|
helperStatefulReleaseServer: 0x1838d448 2010/01/18 20:47:58|
helperStatefulReset: 0x1838d448 2010/01/18 20:47:58|
StatefulGetFirstAvailable: Running servers 10. 2010/01/18
20:47:58| authenticateNegotiateHandleReply: Failed validating
user via Negotiate. Error returned 'type 1 NTLM token'
2010/01/18 20:47:58| authenticateValidateUser: Validated
Auth_user request '0x18648960'. 2010/01/18 20:47:58|
cbdataValid: 0x183561a8 2010/01/18 20:47:58| aclCheck: checking
'http_access deny !password' 2010/01/18 20:47:58|
aclMatchAclList: checking !password 2010/01/18 20:47:58|
aclMatchAcl: checking 'acl password proxy_auth REQUIRED'
2010/01/18 20:47:58| authenticateValidateUser: Validated
Auth_user request '0x18648960'. 2010/01/18 20:47:58|
authenticateNegotiateAuthenticateUser: need to challenge client
'received'! 2010/01/18 20:47:58| authenticateValidateUser:
Validated Auth_user request '0x18648960'. 2010/01/18 20:47:58|
aclAuthenticated: returning 0 sending authentication challenge.
2010/01/18 20:47:58| aclCheck: match found, returning 2
2010/01/18 20:47:58| cbdataUnlock: 0x183561a8 2010/01/18
20:47:58| aclCheckCallback: answer=2 2010/01/18 20:47:58|
cbdataValid: 0x185ca298 2010/01/18 20:47:58| The request GET
http://en-gb.start3.mozilla.com/firefox?client=firefox-a&rls=org.mozilla:en-GB:official
is DENIED, because it matched 'password'
My acl for this was: 'http_access deny !password'
Regards Umesh
2010/1/16 Markus Moeller <huaraz@xxxxxxxxxxxxxxxx>:
Can you check your DNS you should get for
nslookup name an ip and for the reverse nslookup ip the same
name.
Which Kerberos libraries do you use ? Heimdal or MIT and
which release ?
Markus
"Umesh Bodalina" <u.bodalina@xxxxxxxxx> wrote in message
news:c3b47c041001160337k68a1313g1863689383a15121@xxxxxxxxxxxxxxxxx
Hi
When I tried ./squid_kerb_auth_test proxy1 or
./squid_kerb_auth_test proxy1.domain.com I got 2010/01/16
12:31:47| squid_kerb_auth_test: gss_init_sec_context()
failed: Unspecified GSS failure. Minor code may provide more
information. Unknown code krb5 7 Token: NULL
But I got a token if I used ./squid_kerb_auth_test domain.com
or ./squid_kerb_auth_test adserver.domain.com
Using this token and squid auth in the same directory I got
squid_kerb_auth: gss_accept_sec_context() failed: Unspecified
GSS failure. Minor code may provide more information. No
error BH gss_accept_sec_context() failed: Unspecified GSS
failure. Minor code may provide more information. No error
Using the same token on the latest compiled squid
/usr/local/squid/libexec/squid_kerb_auth -d I got
2010/01/16 12:55:58| squid_kerb_auth: parseNegTokenInit
failed with rc=102 2010/01/16 12:55:58| squid_kerb_auth:
gss_accept_sec_context() failed: Unspecified GSS failure.
Minor code may provide more information. No error NA
gss_accept_sec_context() failed: Unspecified GSS failure.
Minor code may provide more information. No error
Any ideas? Regards Umesh
2010/1/15 Markus Moeller <huaraz@xxxxxxxxxxxxxxxx>:
There should be a squid_kerb_auth_test application in the
same source directory as squid_kerb_auth.
Do a kinit user@DOMAIN and then a squid_kerb_auth_test
squid-fqdn which should give you a token like:
Token: YIICPQYGKwYBBQUCoIICMTCCAi2gHzAdBgkqhkiG......
which you can the use with squid_kerb_auth like
export KRB5_KTNAME=/path-to-squid.keytab. ./squid_kerb_auth
-d YR YIICPQYGKwYBBQUCoIICMTCCAi2gHzAdBgkqhkiG......
2010/01/15 14:40:29| squid_kerb_auth: Got 'YR
YIICPQYGKwYBBQUCoIICMTCCAi2gHzAdBgkq...' from squid
(length: 775). 2010/01/15 14:40:29| squid_kerb_auth: Decode
'YIICPQYGKwYBBQUCoIICMTCCAi2gHzAdBgkq...' (decoded length:
577). AF oRQwEqADCgEAoQsGCSqGSIb3EgECAg== markus@xxxxxxxxx
2010/01/15 14:40:29| squid_kerb_auth: AF
oRQwEqADCgEAoQsGCSqGSIb3EgECAg== markus@xxxxxxxxx
Regards Markus
"Markus Moeller" <huaraz@xxxxxxxxxxxxxxxx> wrote in message
news:hipnhp$hs3$1@xxxxxxxxxxxxxxxx
When you use ktpass or msktutil you have to specify a
different AD object then your samba object and remove the
HTTP/... entries as service principal from your samba AD
object. If you want to have only one AD object you have
to use the net keytab command as described in the wiki.
Regards Markus
"Umesh Bodalina" <u.bodalina@xxxxxxxxx> wrote in message
news:c3b47c041001150053n290d6443q830770300636a0ca@xxxxxxxxxxxxxxxxx
Hi Ok. Did that now and I got:
kvno HTTP/proxy1.domain.com HTTP/proxy1@xxxxxxxxxx: kvno
= 5
This number is different from the the keytab number. How
do I correct this?
Yes I did use samba (net ads join -U adminuserid). Then I
tried the msktutil. Then finally ktpass.
During the net ads join I got:
# net ads join -U userid userid's password: Using short
domain name -- DOMAIN DNS update failed! Joined 'PROXY1'
to realm 'DOMAIN.COM'
Is the DNS update a problem?
Regards Umesh
2010/1/15 Markus Moeller <huaraz@xxxxxxxxxxxxxxxx>:
Sorry I forgot to say that you have to do a kinit
aduser@REALM before you issue the kvno command. Did you
use the sambe netjoin command to create the as account
and the keytab ?
Markus
"Umesh Bodalina" <u.bodalina@xxxxxxxxx> wrote in
message
news:c3b47c041001140513s2af2a25fp7e103af29dfc3cbd@xxxxxxxxxxxxxxxxx
Hi Markus I've checked with ADSIEDIT and found a single
entry for the linux server named proxy1. Clicking on
it's properties I found the following entries for
service Principal Name:
28,LDAP://adserver/CN=proxy1,OU=Workstations,OU=ComputerAccounts,OU=name,DC=DOMAIN,DC=COM,servicePrincipalName,servicePrincipalName,HOST/PROXY1
28,LDAP://adserver/CN=proxy1,OU=Workstations,OU=ComputerAccounts,OU=name,DC=DOMAIN,DC=COM,servicePrincipalName,servicePrincipalName,HOST/proxy1.domain.com
28,LDAP://adserver/CN=proxy1,OU=Workstations,OU=ComputerAccounts,OU=name,DC=DOMAIN,DC=COM,servicePrincipalName,servicePrincipalName,HTTP/proxy1
28,LDAP://adserver/CN=proxy1,OU=Workstations,OU=ComputerAccounts,OU=name,DC=DOMAIN,DC=COM,servicePrincipalName,servicePrincipalName,HTTP/proxy1.domain.com
On the linux box:
# klist -ekt /etc/squid/HTTP.keytab Keytab name:
FILE:/etc/squid/HTTP.keytab KVNO Timestamp Principal
---- -----------------
--------------------------------------------------------
7 01/01/70 02:00:00
HTTP/proxy1.domain.com@xxxxxxxxxxxxx (ArcFour with
HMAC/md5)
# kvno HTTP/proxy1.domain.com kvno: Ticket expired
while getting credentials for
HTTP/proxy1.domain.com@xxxxxxxxxxxxx # kvno HTTP/proxy1
kvno: Ticket expired while getting credentials for
HTTP/proxy1@xxxxxxxxxxxxx
Should I remove the entry on AD, rejoin the pc to AD
and create the keytab again? Which mechanism should I
use to create the keytab? Is my DNS correct if the pc
came up on AD as proxy1 should it be the fqdn
(proxy1.domain.com)?
Regards Umesh
2010/1/13 Markus Moeller <huaraz@xxxxxxxxxxxxxxxx>:
On AD you can use ADSIEDIT (
http://technet.microsoft.com/en-us/library/cc773354%28WS.10%29.aspx
) to search for entries and delete,modify them. The
best instructions are
http://wiki.squid-cache.org/ConfigExamples/Authenticate/Kerberos
Let me know what you get once you deleted the old
entry. Another check is to use the kvno tool which
you should have when you use MIT Kerberos.
#kvno HTTP/fqdn@REALM should give the same number as
klist -ekt squid.keytab e.g.
# klist -ekt /etc/squid/squid.keytab Keytab name:
FILE:/etc/squid/squid.keytab KVNO Timestamp Principal
---- -----------------
--------------------------------------------------------
3 11/25/08 20:54:17
HTTP/opensuse11.suse.home@xxxxxxxxx (ArcFour with
HMAC/md5) 3 11/25/08 20:54:17
HTTP/opensuse11.suse.home@xxxxxxxxx (Triple DES cbc
mode with HMAC/sha1) 3 11/25/08 20:54:17
HTTP/opensuse11.suse.home@xxxxxxxxx (DES cbc mode
with CRC-32)
#kvno HTTP/opensuse11.suse.home
HTTP/opensuse11.suse.home@xxxxxxxxx: kvno = 3
Regards Markus
"Umesh Bodalina" <u.bodalina@xxxxxxxxx> wrote in
message
news:c3b47c041001130210i6299c910g51bb3a2ffa5c45f@xxxxxxxxxxxxxxxxx
Hi, I'm new to this. I've run the following command
on the server:
ldapsearch -L -x -D "aduser" -w "password" -h
domainfqdn -p 389 -b "OU=name,DC=domain,DC=com"
"serviceprincipalname=HTTP/fqdn@REALM"
and get # # LDAPv3 # base <OU=name,DC=domain,DC=com>
with scope subtree # filter:
serviceprincipalname=HTTP/fqdn@REALM # requesting:
ALL #
# search result
# numResponses: 1
Is it possible to check directly on AD if this
service principal name exits? How else can I test if
this keytab works? If I create a new keytab what is
the procedure of getting rid of the old one and
retesting (what should be done on AD and the linux
box)?
Are there any docs that will help me with this?
Sorry for being a pain and thanks again. Regards
Umesh
2010/1/13 Markus Moeller <huaraz@xxxxxxxxxxxxxxxx>:
Can you check with an ldap query (e.g. with
ldapadmin from sourceforge) or search with a filter
"(serviceprincipalname=HTTP/fqdn@REALM)" if you
have duplicate entries ?
This kinit -k -t /etc/squid/squid.keytab
HTTP/fqdn@xxxxxxxxxxxxxx will only work if the
userprincipal name is HTTP/fqdn@xxxxxxxxxxxxxx
which I think is not the case with ktpass.
Regards Markus
"Umesh Bodalina" <u.bodalina@xxxxxxxxx> wrote in
message
news:c3b47c041001120741n6c2edf4ftd67dbe4b5cf1e2f0@xxxxxxxxxxxxxxxxx
Hi,
I'm trying to get the squid helper
squid_kerb_auth to work against our Active
Directory (win 2003 sp2).
I've compiled the latest squid version
(squid-2.7.STABLE7)on CentOS 5.4 64 bit.
Squid Cache: Version 2.7.STABLE7 configure
options: '--prefix=/usr/local/squid'
'--disable-wccp' '--disable-wccpv2'
'--enable-large-cache-files' '--with-large-files'
'--enable-delay-pools'
'--enable-cachemgr-hostname' '=fqdn'
'--enable-ntlm-auth-helpers=SMB'
'--enable-auth=basic,ntlm,negotiate'
'--enable-negotiate-auth-helpers=squid_kerb_auth'
'--enable-snmp'
A keytab file was create on AD for squid
(HTTP/squid.domain@xxxxxxxxxxxxxx)
ktpass -princ HTTP/fqdn@REALM -mapuser squiduser
-pass password -out HTTP.keytab
Transferred the file on the CentOS server and
placed it in /etc/squid/HTTP.keytab
kinit -k -t /etc/squid/squid.keytab
HTTP/fqdn@xxxxxxxxxxxxxx
I get the error message: kinit(v5): Client not
found in Kerberos database while getting initial
credentials
I've also tried creating the keytab file using
msktutil or samba according to the following doc:
http://wiki.squid-cache.org/ConfigExamples/Authenticate/Kerberos
I get the same error.
How do I sort out this problem?
Thanks in advance. Regards Umesh