List,
For those interested in testing some prototype code.
attached is a version of packet-kerberos that will dissect the encrypted
parts of kerberos tickets (if the krb5.keytab file which must be in the same
current directory from where ehtereal is started) and also pick up the
encryption keys inside the ticket so later
AP-REQ/AP-REP encrypted blobs can be dissected using the session key.
please test if you are inclined to do so. the keytab file and capture i
posted earlier work well for these tests in case you
do not have capture files and keytab files of your own.
For this to work you must have heimdal kerberos installed on the machine in
the default /usr/heimdal directory
You must also patch Makefile to point to the include and lib directories of
heimdal and link with the proper libs.
Is there someone that knows how the automake thing works that can make it
test for the presence of heimdal and then set the defines
for HAVE_KERBEROS and HAVE_HEIMDAL_KERBEROS in config.h?
So that it can be checked in later and conditionally compiled?
There is apparently a heimdal port to win32 but i dont know anything about
it.
Later people so inclined will be able to add the code to interface with MIT
kerberos instead of heimdal but we have to start somewhere.
best regards
ronnie sahlberg
Attachment:
packet-kerberos.c
Description: Binary data