[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: AP REQUEST decrypt using shared secret



Hello

Does the keytab work if you use a FILE based keytab ?
How do you know the key is correct ?

Love

28 jan 2008 kl. 08.06 skrev Tom Ghyselinck:

> Hello,
>
> I'm having a problem decrypting a ticket from an AP REQUEST using
> krb5_rd_req().
>
> I'm trying to use a MEMORY keytab which seems to work, but my  
> problem is
> the keyblock keyvalue.
>
> We have a shared key between the KDC and our AP REQUEST parser...
> The ticket is using des3-cbc-md5 encryption.
>
> I tried several things to use our shared key:
> - setting the keyblock directly (with the exact hex value
>  of the key string, keytab.keyvalue.length + keytab.keyvalue.data )
> - using krb5_keyblock_init(),
> - Converting the key value using krb5_string_to_key(),
> - Converting the key value using krb5_string_to_key_salt(),
> - ...
>
> But all tries got me into the same result:
>
> 'krb5_rd_req: Decrypt integrity check failed'
>
> Is there any special format for the keyvalue I have to use?
> Or should it be OK when I use krb5_string_to_key?
>
> while debugging a little bit myself,
> the error seems to come from the method:
>
> static krb5_error_code
> verify_checksum(krb5_context context,
>                krb5_crypto crypto,
>                unsigned usage, /* not krb5_key_usage */
>                void *data,
>                size_t len,
>                Checksum *cksum)
> during:
>
>    if(c.checksum.length != cksum->checksum.length ||
>       memcmp(c.checksum.data, cksum->checksum.data,
> c.checksum.length))
>
> the checksum length was always ok, but the data failed...
>
> Anyone has any ideas?
>
> Thanks!
>
> Tom Ghyselinck.
>
> -- 
>
> +---------------------------------------------
> | Please note new email address: tom.ghyselinck@excentis.com
> |
> | Tom Ghyselinck
> | Software Developer
> | Excentis N.V.
> | Gildestraat 8 B-9000 Gent
> | Tel: +32 9 269 22 91 - Fax: +32 9 329 31 74
> +---------------------------------------------
>
>