Win 2003 Server cross-realm authentication - Kerberos

This is a discussion on Win 2003 Server cross-realm authentication - Kerberos ; I've set up a windows 2003 AD, a two-way transitive trust with an MIT Kerberos server, run ksetup to add the realm of the kerb5 server, and have created accounts on both the kerberos server and in the active directory ...

+ Reply to Thread
Results 1 to 5 of 5

Thread: Win 2003 Server cross-realm authentication

  1. Win 2003 Server cross-realm authentication

    I've set up a windows 2003 AD, a two-way transitive trust with an MIT
    Kerberos server, run ksetup to add the realm of the kerb5 server, and
    have created accounts on both the kerberos server and in the active
    directory that allow me to successfully log in individually. I have
    set the active directory server up as a terminal server, and can
    remotely connect successfully using an account in the AD. I've mapped
    usernames in the kerberos database to users in the AD. When I attempt
    to log in to the terminal server using one of the mapped user accounts
    from the kerberos server, I get the following error:
    KDC_ERR_S_PRINCIPAL_UNKNOWN

    I also get the error without intervention about every 5 minutes.

    I've gone through Microsoft's techbase article and troubleshooting
    guide for kerberos errors.
    -No new computer account has been created
    -UDP Fragmentation is not occurring from what I can tell.

    I'm not sure if the service is registered and has an SPN set - and am
    not quite sure how to go about verifying. The username krbtgt exists
    and nothing seems to be wrong with it.

    Could someone please offer some advice? If at all possible, not by
    referring me to a microsoft techbase article - I've been looking at
    those for a week, and either aren't helpful, or aren't clear on what
    the appropriate steps are.


  2. Re: Win 2003 Server cross-realm authentication

    >>>>> "JQ" == jeff quinn writes:

    JQ> I've set up a windows 2003 AD, a two-way transitive trust with an
    JQ> MIT Kerberos server, run ksetup to add the realm of the kerb5
    JQ> server, and have created accounts on both the kerberos server and
    JQ> in the active directory that allow me to successfully log in
    JQ> individually. I have set the active directory server up as a
    JQ> terminal server, and can remotely connect successfully using an
    JQ> account in the AD. I've mapped usernames in the kerberos database
    JQ> to users in the AD. When I attempt to log in to the terminal
    JQ> server using one of the mapped user accounts from the kerberos
    JQ> server, I get the following error: KDC_ERR_S_PRINCIPAL_UNKNOWN

    We need a little more information. I assume you are trying to contact a
    kerberized service in the MIT realm, using a TGT obtained from the Windows
    realm? Is the client Windows or Unix?

    If it's a Windows client, and it is not correctly configured to recognize
    map the DNS name of the server to the external realm, then it will send
    the ticket request to its domain controller, expecting a referral -- but
    the DC does not do referrals for external realms, and so you'll get this
    error.

    JQ> Could someone please offer some advice?

    I would find out exactly what's happening. Look at the KDC log for the
    MIT KDC, and see if the requests are going there. And/or, capture the
    relevant Kerberos traffic (e.g. with Ethereal), and see what's going on.

    --
    Richard Silverman
    res@qoxp.net


  3. Re: Win 2003 Server cross-realm authentication

    Thank you very much for responding. We have quite a few systems here
    that rely on kerberos for authentication. I'm simply trying to use the
    kerberos server to authenticate users on the terminal server. The
    Kerberos server is a on a unix machine. The machines logging in to the
    active directory/terminal server are a mix of unix and windows machines
    (the example below is a windows machine). The logs of the kerberos
    server show the login attempt and it issues a ticket. Below, is a
    network capture of a login attempt from the AD. Thanks again for any
    assistance you can offer.


    The IP addresses have been replaced with a label of the machine. The
    name of the AD is Storage:

    1 1.671875 LOCAL *BROADCAST ARP_RARP ARP: Request, Target IP:
    *KERBSERV_IP*
    FRAME: Base frame properties
    FRAME: Time of capture = 4/18/2006 7:50:11 AM
    FRAME: Time delta from previous physical frame: 0 microseconds
    FRAME: Frame number: 1
    FRAME: Total frame length: 42 bytes
    FRAME: Capture frame length: 42 bytes
    FRAME: Frame data: Number of data bytes remaining = 42 (0x002A)
    ETHERNET: EType = ARP
    ETHERNET: Destination address = FFFFFFFFFFFF
    ETHERNET: 1....... = Group address
    ETHERNET: .1...... = Locally administered address
    ETHERNET: Source address = 000BDB6FD8B6
    ETHERNET: .0...... = Universally administered address
    ETHERNET: Ethernet Type : 0x0806 (ARP)
    ARP_RARP: ARP: Request, Target IP: *KERBSERV_IP*
    ARP_RARP: Hardware Type = Ethernet (10Mb)
    ARP_RARP: Protocol Type = 2048 (0x800)
    ARP_RARP: Hardware Address Length = 6 (0x6)
    ARP_RARP: Protocol Address Length = 4 (0x4)
    ARP_RARP: Opcode = Request
    ARP_RARP: Sender's Hardware Address = 000BDB6FD8B6
    ARP_RARP: Sender's Protocol Address = *TERMSERV/AD_IP*
    ARP_RARP: Target's Hardware Address = 000000000000
    ARP_RARP: Target's Protocol Address = *KERBSERV_IP*


    2 1.671875 00048098B600 LOCAL ARP_RARP ARP: Reply, Target IP:
    *TERMSERV/AD_IP* Target Hdwr Addr: 000BDB6FD8B6
    FRAME: Base frame properties
    FRAME: Time of capture = 4/18/2006 7:50:11 AM
    FRAME: Time delta from previous physical frame: 0 microseconds
    FRAME: Frame number: 2
    FRAME: Total frame length: 60 bytes
    FRAME: Capture frame length: 60 bytes
    FRAME: Frame data: Number of data bytes remaining = 60 (0x003C)
    ETHERNET: EType = ARP
    ETHERNET: Destination address = 000BDB6FD8B6
    ETHERNET: 0....... = Individual address
    ETHERNET: .0...... = Universally administered address
    ETHERNET: Source address = 00048098B600
    ETHERNET: .0...... = Universally administered address
    ETHERNET: Ethernet Type : 0x0806 (ARP)
    ARP_RARP: ARP: Reply, Target IP: *TERMSERV/AD_IP* Target Hdwr Addr:
    000BDB6FD8B6
    ARP_RARP: Hardware Type = Ethernet (10Mb)
    ARP_RARP: Protocol Type = 2048 (0x800)
    ARP_RARP: Hardware Address Length = 6 (0x6)
    ARP_RARP: Protocol Address Length = 4 (0x4)
    ARP_RARP: Opcode = Reply
    ARP_RARP: Sender's Hardware Address = 00048098B600
    ARP_RARP: Sender's Protocol Address = *KERBSERV_IP*
    ARP_RARP: Target's Hardware Address = 000BDB6FD8B6
    ARP_RARP: Target's Protocol Address = *TERMSERV/AD_IP*
    ARP_RARP: Frame Padding

    3 1.671875 LOCAL 00048098B600 UDP Src Port: Unknown (4602); Dst Port:
    Kerberos (88); Length = 176 (0xB0) STORAGE *KERBSERV_IP* IP
    FRAME: Base frame properties
    FRAME: Time of capture = 4/18/2006 7:50:11 AM
    FRAME: Time delta from previous physical frame: 0 microseconds
    FRAME: Frame number: 3
    FRAME: Total frame length: 210 bytes
    FRAME: Capture frame length: 210 bytes
    FRAME: Frame data: Number of data bytes remaining = 210 (0x00D2)
    ETHERNET: EType = Internet IP (IPv4)
    ETHERNET: Destination address = 00048098B600
    ETHERNET: 0....... = Individual address
    ETHERNET: .0...... = Universally administered address
    ETHERNET: Source address = 000BDB6FD8B6
    ETHERNET: .0...... = Universally administered address
    ETHERNET: Ethernet Type : 0x0800 (Internet IP (IPv4))
    IP: Protocol = UDP - User Datagram; Packet ID = 7366; Total IP Length =
    196; Options = No Options
    IP: Version = IPv4; Header Length = 20
    IP: 0100.... = IP Version 4
    IP: ....0101 = Header Length 20
    IP: Type of Service = Normal Service
    IP: 000..... = Precedence - Routine
    IP: ...0.... = Normal Delay
    IP: ....0... = Normal Throughput
    IP: .....0.. = Normal Reliability
    IP: ......0. = Normal Monetary Cost
    IP: Total Length = 196 (0xC4)
    IP: Identification = 7366 (0x1CC6)
    IP: Fragmentation Summary = 0 (0x0)
    IP: .0.............. = May fragment datagram if necessary
    IP: ..0............. = Last fragment in datagram
    IP: ...0000000000000 = Fragment Offset 0 (0x0000)
    IP: Time to Live = 128 (0x80)
    IP: Protocol = UDP - User Datagram
    IP: Checksum = 0 (0x0) (Error)
    IP: Source Address = *TERMSERV/AD_IP*
    IP: Destination Address = *KERBSERV_IP*
    UDP: Src Port: Unknown (4602); Dst Port: Kerberos (88); Length = 176
    (0xB0)
    UDP: Source Port = 0x11FA
    UDP: Destination Port = Kerberos
    UDP: Total length = 176 (0xB0)
    UDP: UDP Checksum = 0x3E4C
    UDP: Data: Number of data bytes remaining = 168 (0x00A8)

    4 1.687500 LOCAL 00132061858D TCP Control Bits: .AP..., len: 919, seq:
    933751078-933751997, ack:4180476450, win:64615, src: 3389 dst: 4131
    STORAGE *USER_MACHINE_IP* IP
    FRAME: Base frame properties
    FRAME: Time of capture = 4/18/2006 7:50:11 AM
    FRAME: Time delta from previous physical frame: 15625 microseconds
    FRAME: Frame number: 4
    FRAME: Total frame length: 973 bytes
    FRAME: Capture frame length: 973 bytes
    FRAME: Frame data: Number of data bytes remaining = 973 (0x03CD)
    ETHERNET: EType = Internet IP (IPv4)
    ETHERNET: Destination address = 00132061858D
    ETHERNET: 0....... = Individual address
    ETHERNET: .0...... = Universally administered address
    ETHERNET: Source address = 000BDB6FD8B6
    ETHERNET: .0...... = Universally administered address
    ETHERNET: Ethernet Type : 0x0800 (Internet IP (IPv4))
    IP: Protocol = TCP - Transmission Control; Packet ID = 7367; Total IP
    Length = 959; Options = No Options
    IP: Version = IPv4; Header Length = 20
    IP: 0100.... = IP Version 4
    IP: ....0101 = Header Length 20
    IP: Type of Service = Normal Service
    IP: 000..... = Precedence - Routine
    IP: ...0.... = Normal Delay
    IP: ....0... = Normal Throughput
    IP: .....0.. = Normal Reliability
    IP: ......0. = Normal Monetary Cost
    IP: Total Length = 959 (0x3BF)
    IP: Identification = 7367 (0x1CC7)
    IP: Fragmentation Summary = 16384 (0x4000)
    IP: .1.............. = Cannot fragment datagram
    IP: ..0............. = Last fragment in datagram
    IP: ...0000000000000 = Fragment Offset 0 (0x0000)
    IP: Time to Live = 128 (0x80)
    IP: Protocol = TCP - Transmission Control
    IP: Checksum = 0 (0x0) (Error)
    IP: Source Address = *TERMSERV/AD_IP*
    IP: Destination Address = *USER_MACHINE_IP*
    TCP: Control Bits: .AP..., len: 919, seq: 933751078-933751997,
    ack:4180476450, win:64615, src: 3389 dst: 4131
    TCP: Source Port = 0x0D3D
    TCP: Destination Port = 0x1023
    TCP: Sequence Number = 933751078 (0x37A7E926)
    TCP: Acknowledgement Number = 4180476450 (0xF92D0222)
    TCP: Data Offset = 20 bytes
    TCP: 0101.... = Data Offset (20 bytes)
    TCP: ....0000 = Reserved bits
    TCP: Flags = 0x18 : .AP...
    TCP: ..0..... = No urgent data
    TCP: ...1.... = Acknowledgement field significant
    TCP: ....1... = Push function
    TCP: .....0.. = No Reset
    TCP: ......0. = No Synchronize
    TCP: .......0 = Not the end of the data
    TCP: Window = 64615 (0xFC67)
    TCP: Checksum = ERROR: CheckSum is 0x4D3B, Should be 0xEA71
    TCP: Urgent Pointer = 0 (0x0)
    TCP: Data: Number of data bytes remaining = 919 (0x0397)

    5 1.687500 00132061858D LOCAL TCP Control Bits: .A...., len: 0,
    seq:4180476450-4180476450, ack: 933751997, win:65535, src: 4131 dst:
    3389 *USER_MACHINE_IP* STORAGE IP
    FRAME: Base frame properties
    FRAME: Time of capture = 4/18/2006 7:50:11 AM
    FRAME: Time delta from previous physical frame: 0 microseconds
    FRAME: Frame number: 5
    FRAME: Total frame length: 60 bytes
    FRAME: Capture frame length: 60 bytes
    FRAME: Frame data: Number of data bytes remaining = 60 (0x003C)
    ETHERNET: EType = Internet IP (IPv4)
    ETHERNET: Destination address = 000BDB6FD8B6
    ETHERNET: 0....... = Individual address
    ETHERNET: .0...... = Universally administered address
    ETHERNET: Source address = 00132061858D
    ETHERNET: .0...... = Universally administered address
    ETHERNET: Ethernet Type : 0x0800 (Internet IP (IPv4))
    IP: Protocol = TCP - Transmission Control; Packet ID = 21036; Total IP
    Length = 40; Options = No Options
    IP: Version = IPv4; Header Length = 20
    IP: 0100.... = IP Version 4
    IP: ....0101 = Header Length 20
    IP: Type of Service = Normal Service
    IP: 000..... = Precedence - Routine
    IP: ...0.... = Normal Delay
    IP: ....0... = Normal Throughput
    IP: .....0.. = Normal Reliability
    IP: ......0. = Normal Monetary Cost
    IP: Total Length = 40 (0x28)
    IP: Identification = 21036 (0x522C)
    IP: Fragmentation Summary = 16384 (0x4000)
    IP: .1.............. = Cannot fragment datagram
    IP: ..0............. = Last fragment in datagram
    IP: ...0000000000000 = Fragment Offset 0 (0x0000)
    IP: Time to Live = 128 (0x80)
    IP: Protocol = TCP - Transmission Control
    IP: Checksum = 24346 (0x5F1A)
    IP: Source Address = *USER_MACHINE_IP*
    IP: Destination Address = *TERMSERV/AD_IP*
    TCP: Control Bits: .A...., len: 0, seq:4180476450-4180476450, ack:
    933751997, win:65535, src: 4131 dst: 3389
    TCP: Source Port = 0x1023
    TCP: Destination Port = 0x0D3D
    TCP: Sequence Number = 4180476450 (0xF92D0222)
    TCP: Acknowledgement Number = 933751997 (0x37A7ECBD)
    TCP: Data Offset = 20 bytes
    TCP: 0101.... = Data Offset (20 bytes)
    TCP: ....0000 = Reserved bits
    TCP: Flags = 0x10 : .A....
    TCP: ..0..... = No urgent data
    TCP: ...1.... = Acknowledgement field significant
    TCP: ....0... = No Push function
    TCP: .....0.. = No Reset
    TCP: ......0. = No Synchronize
    TCP: .......0 = Not the end of the data
    TCP: Window = 65535 (0xFFFF)
    TCP: Checksum = 0x2936
    TCP: Urgent Pointer = 0 (0x0)

    6 1.687500 00048098B600 LOCAL UDP Src Port: Kerberos (88); Dst Port:
    Unknown (4602); Length = 586 (0x24A) *KERBSERV_IP* STORAGE IP
    FRAME: Base frame properties
    FRAME: Time of capture = 4/18/2006 7:50:11 AM
    FRAME: Time delta from previous physical frame: 0 microseconds
    FRAME: Frame number: 6
    FRAME: Total frame length: 620 bytes
    FRAME: Capture frame length: 620 bytes
    FRAME: Frame data: Number of data bytes remaining = 620 (0x026C)
    ETHERNET: EType = Internet IP (IPv4)
    ETHERNET: Destination address = 000BDB6FD8B6
    ETHERNET: 0....... = Individual address
    ETHERNET: .0...... = Universally administered address
    ETHERNET: Source address = 00048098B600
    ETHERNET: .0...... = Universally administered address
    ETHERNET: Ethernet Type : 0x0800 (Internet IP (IPv4))
    IP: Protocol = UDP - User Datagram; Packet ID = 32269; Total IP Length
    = 606; Options = No Options
    IP: Version = IPv4; Header Length = 20
    IP: 0100.... = IP Version 4
    IP: ....0101 = Header Length 20
    IP: Type of Service = Normal Service
    IP: 000..... = Precedence - Routine
    IP: ...0.... = Normal Delay
    IP: ....0... = Normal Throughput
    IP: .....0.. = Normal Reliability
    IP: ......0. = Normal Monetary Cost
    IP: Total Length = 606 (0x25E)
    IP: Identification = 32269 (0x7E0D)
    IP: Fragmentation Summary = 16384 (0x4000)
    IP: .1.............. = Cannot fragment datagram
    IP: ..0............. = Last fragment in datagram
    IP: ...0000000000000 = Fragment Offset 0 (0x0000)
    IP: Time to Live = 63 (0x3F)
    IP: Protocol = UDP - User Datagram
    IP: Checksum = 27785 (0x6C89)
    IP: Source Address = *KERBSERV_IP*
    IP: Destination Address = *TERMSERV/AD_IP*
    UDP: Src Port: Kerberos (88); Dst Port: Unknown (4602); Length = 586
    (0x24A)
    UDP: Source Port = Kerberos
    UDP: Destination Port = 0x11FA
    UDP: Total length = 586 (0x24A)
    UDP: UDP Checksum = 0x94BE
    UDP: Data: Number of data bytes remaining = 578 (0x0242)

    7 1.687500 LOCAL 00048098B600 UDP Src Port: Unknown (4603); Dst Port:
    Kerberos (88); Length = 578 (0x242) STORAGE *KERBSERV_IP* IP
    FRAME: Base frame properties
    FRAME: Time of capture = 4/18/2006 7:50:11 AM
    FRAME: Time delta from previous physical frame: 0 microseconds
    FRAME: Frame number: 7
    FRAME: Total frame length: 612 bytes
    FRAME: Capture frame length: 612 bytes
    FRAME: Frame data: Number of data bytes remaining = 612 (0x0264)
    ETHERNET: EType = Internet IP (IPv4)
    ETHERNET: Destination address = 00048098B600
    ETHERNET: 0....... = Individual address
    ETHERNET: .0...... = Universally administered address
    ETHERNET: Source address = 000BDB6FD8B6
    ETHERNET: .0...... = Universally administered address
    ETHERNET: Ethernet Type : 0x0800 (Internet IP (IPv4))
    IP: Protocol = UDP - User Datagram; Packet ID = 7368; Total IP Length =
    598; Options = No Options
    IP: Version = IPv4; Header Length = 20
    IP: 0100.... = IP Version 4
    IP: ....0101 = Header Length 20
    IP: Type of Service = Normal Service
    IP: 000..... = Precedence - Routine
    IP: ...0.... = Normal Delay
    IP: ....0... = Normal Throughput
    IP: .....0.. = Normal Reliability
    IP: ......0. = Normal Monetary Cost
    IP: Total Length = 598 (0x256)
    IP: Identification = 7368 (0x1CC8)
    IP: Fragmentation Summary = 0 (0x0)
    IP: .0.............. = May fragment datagram if necessary
    IP: ..0............. = Last fragment in datagram
    IP: ...0000000000000 = Fragment Offset 0 (0x0000)
    IP: Time to Live = 128 (0x80)
    IP: Protocol = UDP - User Datagram
    IP: Checksum = 0 (0x0) (Error)
    IP: Source Address = *TERMSERV/AD_IP*
    IP: Destination Address = *KERBSERV_IP*
    UDP: Src Port: Unknown (4603); Dst Port: Kerberos (88); Length = 578
    (0x242)
    UDP: Source Port = 0x11FB
    UDP: Destination Port = Kerberos
    UDP: Total length = 578 (0x242)
    UDP: UDP Checksum = 0xA213
    UDP: Data: Number of data bytes remaining = 570 (0x023A)

    8 1.687500 00048098B600 LOCAL UDP Src Port: Kerberos (88); Dst Port:
    Unknown (4603); Length = 543 (0x21F) *KERBSERV_IP* STORAGE IP
    FRAME: Base frame properties
    FRAME: Time of capture = 4/18/2006 7:50:11 AM
    FRAME: Time delta from previous physical frame: 0 microseconds
    FRAME: Frame number: 8
    FRAME: Total frame length: 577 bytes
    FRAME: Capture frame length: 577 bytes
    FRAME: Frame data: Number of data bytes remaining = 577 (0x0241)
    ETHERNET: EType = Internet IP (IPv4)
    ETHERNET: Destination address = 000BDB6FD8B6
    ETHERNET: 0....... = Individual address
    ETHERNET: .0...... = Universally administered address
    ETHERNET: Source address = 00048098B600
    ETHERNET: .0...... = Universally administered address
    ETHERNET: Ethernet Type : 0x0800 (Internet IP (IPv4))
    IP: Protocol = UDP - User Datagram; Packet ID = 32270; Total IP Length
    = 563; Options = No Options
    IP: Version = IPv4; Header Length = 20
    IP: 0100.... = IP Version 4
    IP: ....0101 = Header Length 20
    IP: Type of Service = Normal Service
    IP: 000..... = Precedence - Routine
    IP: ...0.... = Normal Delay
    IP: ....0... = Normal Throughput
    IP: .....0.. = Normal Reliability
    IP: ......0. = Normal Monetary Cost
    IP: Total Length = 563 (0x233)
    IP: Identification = 32270 (0x7E0E)
    IP: Fragmentation Summary = 16384 (0x4000)
    IP: .1.............. = Cannot fragment datagram
    IP: ..0............. = Last fragment in datagram
    IP: ...0000000000000 = Fragment Offset 0 (0x0000)
    IP: Time to Live = 63 (0x3F)
    IP: Protocol = UDP - User Datagram
    IP: Checksum = 27827 (0x6CB3)
    IP: Source Address = *KERBSERV_IP*
    IP: Destination Address = *TERMSERV/AD_IP*
    UDP: Src Port: Kerberos (88); Dst Port: Unknown (4603); Length = 543
    (0x21F)
    UDP: Source Port = Kerberos
    UDP: Destination Port = 0x11FB
    UDP: Total length = 543 (0x21F)
    UDP: UDP Checksum = 0x4253
    UDP: Data: Number of data bytes remaining = 535 (0x0217)


  4. Re: Win 2003 Server cross-realm authentication


    Unfortunately, the network trace you provided is useless, because it
    decodes Ethernet/IP/UDP, then does not show what matters: the contents of
    the Kerberos messages in the UDP packets. Try something like Ethereal,
    which can decode those as well.

    --
    Richard Silverman
    res@qoxp.net


  5. Re: Win 2003 Server cross-realm authentication

    jeff.quinn@gmail.com wrote:
    > I've set up a windows 2003 AD, a two-way transitive trust with an MIT
    > Kerberos server, run ksetup to add the realm of the kerb5 server, and
    > have created accounts on both the kerberos server and in the active
    > directory that allow me to successfully log in individually. I have
    > set the active directory server up as a terminal server, and can
    > remotely connect successfully using an account in the AD. I've mapped
    > usernames in the kerberos database to users in the AD. When I attempt
    > to log in to the terminal server using one of the mapped user accounts
    > from the kerberos server, I get the following error:
    > KDC_ERR_S_PRINCIPAL_UNKNOWN
    >
    > I also get the error without intervention about every 5 minutes.
    >
    > I've gone through Microsoft's techbase article and troubleshooting
    > guide for kerberos errors.
    > -No new computer account has been created
    > -UDP Fragmentation is not occurring from what I can tell.
    >
    > I'm not sure if the service is registered and has an SPN set - and am
    > not quite sure how to go about verifying. The username krbtgt exists
    > and nothing seems to be wrong with it.
    >
    > Could someone please offer some advice? If at all possible, not by
    > referring me to a microsoft techbase article - I've been looking at
    > those for a week, and either aren't helpful, or aren't clear on what
    > the appropriate steps are.


    Do you have Service Pack 1 installed? Can these users login "on the
    glass" ?

    Does http://support.microsoft.com/?kbid=902336 describe your situation?

    If so, the problem is that something is broken and network traces should
    show that Windows is looking for Domain Controllers in the "domain" of
    the Kereros Realm instead of the actual windows domain and failing,
    resulting in the above error.

    Both the hotfix and the workaround appear to solve this prolem.

    < --
    Christopher D. Clausen
    ACM@UIUC SysAdmin


    ________________________________________________
    Kerberos mailing list Kerberos@mit.edu
    https://mailman.mit.edu/mailman/listinfo/kerberos


+ Reply to Thread