Debian: 2129-1: krb5: checksum verification weakn


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) Debian: 2129-1: krb5: checksum verification weakn
# 1  
Old 12-01-2010
Debian: 2129-1: krb5: checksum verification weakn

LinuxSecurity.com: A vulnerability has been found in krb5, the MIT implementation of Kerberos. MIT krb5 clients incorrectly accept an unkeyed checksums in the SAM-2 [More...]

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

3 More Discussions You Might Find Interesting

1. HP-UX

Compile samba with krb5

./configure --prefix=/opt/samba --libdir=/opt/samba/lib --bindir=/opt/samba/bin --sbindir=/opt/samba/sbin --mandir=/opt/samba/man --sysconfdir=/etc/opt/samba --with-configdir=/etc/opt/samba --with-piddir=/var/opt/samba/locks --with-privatedir=/etc/opt/samba/private ... (1 Reply)
Discussion started by: Linusolaradm1
1 Replies

2. HP-UX

Compile krb5-appl 1.0.3 on hpux

asprintf.c: In function 'vasprintf': asprintf.c:58: error: 'SIZE_MAX' undeclared (first use in this function) asprintf.c:58: error: (Each undeclared identifier is reported only once asprintf.c:58: error: for each function it appears in.) Someone know how to fix? Thanks (2 Replies)
Discussion started by: Linusolaradm1
2 Replies

3. IP Networking

Wireshark UDP checksum bad checksum

Hello I am communicating with two devices using my computer over UDP protocol. The application is running fine. When I monitored the UDP traffic using Wireshark software, I found that there were too many Checksum errors. Please find attached the png file showing this error. I am about to... (0 Replies)
Discussion started by: AustinCann
0 Replies
Login or Register to Ask a Question
gkadmin(1M)                                               System Administration Commands                                               gkadmin(1M)

NAME
gkadmin - Kerberos database administration GUI, SEAM Administration Tool SYNOPSIS
/usr/sbin/gkadmin DESCRIPTION
gkadmin is an interactive graphical user interface (GUI) that enables you to maintain Kerberos principals and policies. gkadmin provides much the same functionality as the kadmin(1M) command. gkadmin does not support the management of keytabs. You must use kadmin for keytabs management. gkadmin uses Kerberos authentication and an encrypted RPC to operate securely from anywhere on the network. When gkadmin is invoked, the login window is populated with default values. For the principal name, gkadmin determines your user name from the USER environment variable. It appends /admin to the name (username/admin) to create a default user instance in the same manner as kad- min. It also selects appropriate defaults for realm and master KDC (admin_server) from the /etc/krb5/krb5.conf file. You can change these defaults on the login window. When you enter your password, a session is started with kadmind. Operations performed are subject to permissions that are granted or denied to the chosen user instance by the Kerberos ACL file. See kadm5.acl(4). After the session is started, a tabbed folder is displayed that contains a principal list and a policy list. The functionality is mainly the same as kadmin, with addition, deletion, and modification of principal and policy data available. In addition, gkadmin provides the following features: o New principal or policy records can be added either from default values or from the settings of an existing principal. o A comment field is available for principals. o Default values are saved in $HOME/.gkadmin. o A logout option permits you to log back in as another user instance without exiting the tool. o Principal and policy lists and attributes can be printed or saved to a file. o Online context-sensitive help and general help is available in the Help menu. FILES
/etc/krb5/krb5.conf Kerberos configuration information on a Kerberos client. Used to search for default realm and master KDC (admin_server), including a port number for the master KDC. $HOME/.gkadmin Default parameters used to initialize new principals created during the session. ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Availability |SUNWkdcu | +-----------------------------+-----------------------------+ |Interface Stability |Evolving | +-----------------------------+-----------------------------+ SEE ALSO
kpasswd(1), kadmin(1M), kadmind(1M), kadmin.local(1M), kdb5_util(1M), kadm5.acl(4), kdc.conf(4), krb5.conf(4), attributes(5), SEAM(5) DIAGNOSTICS
The gkadmin interface is currently incompatible with the MIT kadmind daemon interface, so you cannot use this interface to administer an MIT-based Kerberos database. However, SEAM-based Kerberos clients can still use an MIT-based KDC. SunOS 5.10 25 Feb 2002 gkadmin(1M)