<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Recent changes to feature-requests</title><link>https://sourceforge.net/p/modauthkerb/feature-requests/</link><description>Recent changes to feature-requests</description><atom:link href="https://sourceforge.net/p/modauthkerb/feature-requests/feed.rss" rel="self"/><language>en</language><lastBuildDate>Sat, 17 Jun 2017 14:33:36 -0000</lastBuildDate><atom:link href="https://sourceforge.net/p/modauthkerb/feature-requests/feed.rss" rel="self" type="application/rss+xml"/><item><title>#14 Support of NTLM</title><link>https://sourceforge.net/p/modauthkerb/feature-requests/14/?limit=25#bdda</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Did this ever progress? Any hope of Kerberos falling back to NTLMv2 authentication?&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nick Pierpoint</dc:creator><pubDate>Sat, 17 Jun 2017 14:33:36 -0000</pubDate><guid>https://sourceforge.net87562ad5747b8e3062cf30d3bc719bc23bde3b23</guid></item><item><title>Add support for Nego2</title><link>https://sourceforge.net/p/modauthkerb/feature-requests/18/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;Please add support for MS-N2HT [ref]. This will allow conection from Internet Explorer to fail, without showing a password popup (because trying NTLM).&lt;/p&gt;
&lt;p&gt;Regards&lt;/p&gt;
&lt;p&gt;[ref]: &lt;a href="http://msdn.microsoft.com/en-us/library/dd303576\" rel="nofollow"&gt;http://msdn.microsoft.com/en-us/library/dd303576\&lt;/a&gt;(v=prot.10)&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mathieu PARENT</dc:creator><pubDate>Mon, 23 Jul 2012 11:18:34 -0000</pubDate><guid>https://sourceforge.netc7de26ca3c6c3e553e5bd77152eec70d8d939a38</guid></item><item><title>Fallback to Digest Authentication if KrbMethodK5Passwd on</title><link>https://sourceforge.net/p/modauthkerb/feature-requests/17/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Hi,&lt;br /&gt;
first of all, mod_auth_kerb is a great module and I am successfully using it in our intranet with Active Directory.&lt;br /&gt;
My question/feature request:&lt;br /&gt;
Is it possible to fall back to digest auth if kerb auth fails?&lt;br /&gt;
Now, if kerb auth fails (for whatever reason), the user has to manually enter his password for basic auth, which gets transmitted in cleartext. It would be better, if digest auth would be used for fallback (setting up ssl for our small intranet would be overkill).&lt;br /&gt;
thanks&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">ernst brammer</dc:creator><pubDate>Tue, 25 May 2010 11:07:56 -0000</pubDate><guid>https://sourceforge.net441384b901526da569be5c15de56f7d5cf60ebbd</guid></item><item><title>Stop passing password through to web applications</title><link>https://sourceforge.net/p/modauthkerb/feature-requests/16/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;When using KrbMethodK5Passwd, it is possible to see the user-entered password from a php script by reading the variable $_SERVER["PHP_AUTH_PW"]. I think there must be an option to remove this value out of the headers list passed through to scripts and applications - i think not only php is  able to get this value.&lt;/p&gt;
&lt;p&gt;Just check with this script:&lt;br /&gt;
&amp;lt;?php&lt;br /&gt;
echo date('j.n.Y H:i:s').'&amp;lt;br/&amp;gt;';&lt;br /&gt;
echo $_SERVER["REMOTE_USER"].'&amp;lt;br/&amp;gt;';&lt;br /&gt;
echo $_SERVER["AUTH_TYPE"].'&amp;lt;br/&amp;gt;';&lt;br /&gt;
echo $_SERVER["PHP_AUTH_PW"].'&amp;lt;br/&amp;gt;';&lt;br /&gt;
?&amp;gt;&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Anonymous</dc:creator><pubDate>Thu, 18 Mar 2010 00:04:31 -0000</pubDate><guid>https://sourceforge.netb1fbc661fbd0bc3c3abcabfc95bf0af8305f5ad3</guid></item><item><title>Building Kerberos for Windows server</title><link>https://sourceforge.net/p/modauthkerb/feature-requests/15/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Has this been tested on apache running on a windows server, and what the compilation steps for windows environment.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Anonymous</dc:creator><pubDate>Mon, 21 Dec 2009 11:14:26 -0000</pubDate><guid>https://sourceforge.net202837bd0a4869f01ce07487bafbdca27e8837b1</guid></item><item><title>Support of NTLM</title><link>https://sourceforge.net/p/modauthkerb/feature-requests/14/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;When doing Negotiate the IE browser may choose to use NTLM if Kerberos isn't available on the client. Since several Kerberos implementations support NTLM under GSSAPI, the module could provide fallback to NTLM for clients that can't speak Kerberos. See also &lt;a href="https://sourceforge.net/mailarchive/forum.php?thread_name=0DC212FE7F69B24F81D2C4F1E65FCC2303D55CA5%40svits11.main.ad.rit.edu&amp;amp;forum_id=18368"&gt;https://sourceforge.net/mailarchive/forum.php?thread_name=0DC212FE7F69B24F81D2C4F1E65FCC2303D55CA5%40svits11.main.ad.rit.edu&amp;amp;forum_id=18368&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Daniel Kouril</dc:creator><pubDate>Wed, 05 Aug 2009 07:30:25 -0000</pubDate><guid>https://sourceforge.net1884fa1c2fbe208a28402796d517230e2a516d16</guid></item><item><title>Passing delegated credentials to tomcat</title><link>https://sourceforge.net/p/modauthkerb/feature-requests/13/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;I'd like to have delegated credentials be available to tomcat servlets&lt;br /&gt;
and any processes executed in the tomcat environment.  I am using&lt;br /&gt;
tomcat behind apache with the AJP connector (with the mod_proxy_ajp&lt;br /&gt;
apache module providing the connection to apache).&lt;/p&gt;
&lt;p&gt;One of the problems is that (depending on the apache connector--&lt;br /&gt;
I believe) no information regarding the apache environment is transferred&lt;br /&gt;
over to the tomcat service.  Therefore, even though mod_auth_kerb can&lt;br /&gt;
be configured to save credentials, the file cache name does not get&lt;br /&gt;
transferred to tomcat.  Furthermore, if you have tomcat running with&lt;br /&gt;
a separate user's privileges, the file cache saved by mod_auth_kerb&lt;br /&gt;
is not readable by the tomcat process.&lt;/p&gt;
&lt;p&gt;I've come up with two possible solutions:&lt;br /&gt;
1.  Send tomcat the location of the file cache: (I'm using this solution right now)&lt;br /&gt;
a.  Tomcat must run as the same user as does apache&lt;br /&gt;
b.  The location of the cache must be added to the in-bound HTTP headers:&lt;br /&gt;
In version 5.4, this involves a one-line addition at&lt;br /&gt;
src/mod_auth_kerb.c:871&lt;br /&gt;
apr_table_setn(r-&amp;gt;subprocess_env, "KRB5CCNAME", ccname);&lt;br /&gt;
+   apr_table_setn(r-&amp;gt;headers_in, "KRB5CCNAME", ccname);&lt;/p&gt;
&lt;p&gt;This way, the location of the file cache is stored in the headers for tomcat to examine.&lt;br /&gt;
Because tomcat runs as the apache user, there are no file permission problems.&lt;br /&gt;
I imagine that if this is the best solution, there ought to be a configuration option&lt;br /&gt;
to select whether you want to store the location of the file cache in the in-&lt;br /&gt;
bound headers.&lt;/p&gt;
&lt;p&gt;2.  Encode the actual cache using base64 encoding and save the result to the in-bound headers.&lt;br /&gt;
Using this solution, apache and tomcat can remain as processes of separate users,&lt;br /&gt;
thereby allowing apache to run under SELinux or similar restricted mode without effecting&lt;br /&gt;
the backend tomcat processes.&lt;br /&gt;
If this were the best option, I think it would be necessary to have a configuration option&lt;br /&gt;
that requests this functionality explicitly.&lt;/p&gt;
&lt;p&gt;Is there already a better solution out there?  If not, which of these two possible&lt;br /&gt;
solutions would be deemed best?&lt;/p&gt;
&lt;p&gt;solution #1 is very easy to implement as it only involves adding one line to mod_auth_kerb.c.&lt;/p&gt;
&lt;p&gt;Can we get this functionality in mod_auth_kerb?&lt;br /&gt;
&lt;/p&gt;
&lt;p&gt;Thanks&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Spencer Olson</dc:creator><pubDate>Tue, 12 May 2009 21:30:50 -0000</pubDate><guid>https://sourceforge.neta78256d1efa4c3fa97845e1e4c50d58b93f0f3b4</guid></item><item><title>MacOS X Configuration hints</title><link>https://sourceforge.net/p/modauthkerb/feature-requests/12/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Just a few point that might be mentioned in the README or INSTALL files.&lt;/p&gt;
&lt;p&gt;MacOS X runs multiple architectures with fat binaries.  In MacOS X 10.4 Tiger most system binaries are fat, in 10.5 Leopard they all are and contain 4 arches ppc, ppc64, i386 and x86_64.  All current Macs which have 64bit capable Intel CPUs will run three of these arches - ppc, i386 and x86_64.&lt;/p&gt;
&lt;p&gt;The Apple Kerberos implementation which seems to be written by MIT provides krb4 and krb5 in i386 but only krb5 in x86_64.&lt;/p&gt;
&lt;p&gt;By default, the Apple gcc compilers will build the local 32bit arch.&lt;/p&gt;
&lt;p&gt;However, 64 bit capable hardware will by default run the 64bit arch if provided.  So a default ./configure;make build will fail trying to load a 32bit module into the running 64bit Apache.&lt;/p&gt;
&lt;p&gt;To build 64 bit on Intel hardware, the option '-arch x86_64' needs to be in the CC definition used during configure and added to CFLAGS and LDFLAGS in config_vars.mk.   '--with-krb4=no' is also a good idea for configure.&lt;/p&gt;
&lt;p&gt;Only one -arch option can be used at a time due to the differences in the libraries for different arches.  A fat binary for the module would need to be build one arch at a time and assembled with lipo.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Bill Northcott</dc:creator><pubDate>Tue, 27 Jan 2009 01:12:10 -0000</pubDate><guid>https://sourceforge.net21953a5e2a670c0a221a7438f5678ddad4462c12</guid></item><item><title>Microsoft PAC kerberos ticket parsing</title><link>https://sourceforge.net/p/modauthkerb/feature-requests/11/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Hi all,&lt;br /&gt;
it would be very useful if would be implemented a functionality that parse pac section that is added to kerberos service tickets by Active Directory KDC so would be possible to use an AD domain controller like kerberos authorization system (for example specifying "require group groupname" in auth_kerb.conf) and not only for authentication.&lt;/p&gt;
&lt;p&gt;&lt;a href="http://searchwindowssecurity.techtarget.com/news/article/0" rel="nofollow"&gt;http://searchwindowssecurity.techtarget.com/news/article/0&lt;/a&gt;,289142,sid45_gci1014058,00.html&lt;/p&gt;
&lt;p&gt;Sorry for my bad english :)!&lt;/p&gt;
&lt;p&gt;massimiliano.laporta@gmail.com&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Anonymous</dc:creator><pubDate>Mon, 05 May 2008 16:06:16 -0000</pubDate><guid>https://sourceforge.neta64de1c00698889d28df3ee5f554aa206d56ac28</guid></item><item><title>KrbAppendRealm</title><link>https://sourceforge.net/p/modauthkerb/feature-requests/10/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Can the Krb_Append_Realm patch/option be merged into the base code?&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jason Heffner</dc:creator><pubDate>Fri, 08 Dec 2006 13:57:20 -0000</pubDate><guid>https://sourceforge.neted224a664c1a4a3d9d56755ccc709cd6a554513d</guid></item></channel></rss>