-
Notifications
You must be signed in to change notification settings - Fork 3.8k
GetUserSPNs: you can now specify another base DN #330
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
GetUserSPNs: you can now specify another base DN #330
Conversation
|
This is a good idea @the-useless-one, let me know when you have it fixed and I'll go ahead and review/merge. Thanks! |
|
Ok, I added the possibility to request TGS cross-domain. Here's what happens when a user from domain A wants a TGS for a service in domain B:
To implement this, I had to modify the However, I did not find a way to determine which KDC to interrogate base on the referral TGS. For now, I just put I encourage you to test the PR, it works fine on my end in a prod environment, and it even seems to work with Kerberos authentication (which means I didn't break everything). The nice thing with the recursion in Hope this proves helpful, cheers! Y |
|
Thanks for the PR @the-useless-one. I want to be sure the changes in |
|
Great, thanks a lot! Just so you know, I was still able to generate TGT with |
|
Thanks for checking those things @the-useless-one. What I'm mostly concerned are the Have you tried that one? |
|
Hmm, I did try it with the |
|
Sorry I didn't answer you before @the-useless-one... too much stuff on my plate.. I want to be sure that, for example, |
|
I'm starting to look at this @the-useless-one... There's something confusing (and probably my fault). Adding a To be continued.. |
|
In what format is BaseDN specified? I've tried this a couple of ways and it hasn't seemed to work for me. |
|
Hi @mubix, the $ GetUserSPNs.py domain1.local/user1:password1 -kdc-ip $domain1_dc_ip -base-dn domain2.local -dc-ip $domain2_dc_ip -requestIt's well possible that there are still some errors. Please, post the details here so that I can correct them. Thanks! |
|
@asolino, sorry I didn't respond to your comment. After answering @mubix's question, I do realize that having Finally, I still don't have a solution for my "dirty fix" of using As you said, to be continued... |
Hello @asolino,
I added the possibility to specify another base DN when interrogating the DC. This way, if you have a trust relationship between Domains A and B, you can use a user from domain A to get kerberos tickets from a domain B DC.
Cheers,
Y
[Edit] Hmm, actually this PR only enables you to list SPNs cross-domain, but not to request TGS cross-domain. Right now, you get a
Kerberos SessionError: KDC_ERR_WRONG_REALM(Reserved for future use)error message. I'll try and fix it!