On Tue, 13 Dec 2011 18:27:00 +0100, David Touzeau wrote:
> Dear
>
> I would like to connect my squid 3.2 to the Active Directory 2003
>
> All Kerberos settings should working
>
> # /usr/bin/kinit Administrateur_at_MAISON.TOUZEAU.BIZ -V 2>&1
> Password for Administrateur_at_MAISON.TOUZEAU.BIZ:
> Authenticated to Kerberos v5
>
> # klist
> Ticket cache: FILE:/tmp/krb5cc_0
> Default principal: Administrateur_at_MAISON.TOUZEAU.BIZ
>
> Valid starting     Expires            Service principal
> 12/13/11 17:10:26  12/14/11 03:10:24
> krbtgt/MAISON.TOUZEAU.BIZ_at_MAISON.TOUZEAU.BIZ
> renew until 12/14/11 17:10:26
>
>
> Squid.conf
>
> auth_param negotiate program /lib/squid3/negotiate_kerberos_auth -d 
> -s
> HTTP/squid32-64.touzeau.com
> auth_param negotiate children 10
> auth_param negotiate keep_alive on
> auth_param basic realm Squid proxy-caching web server
> auth_param basic credentialsttl 2 hour
> authenticate_ip_ttl 60 seconds
> authenticate_cache_garbage_interval 10 seconds
> authenticate_ttl 0 hour
> #--------- kerberos ACL settings
> acl AUTHENTICATED proxy_auth REQUIRED
>
> In events squid claim
>
> 011/12/13 17:11:27 kid1| ERROR: Negotiate Authentication validating
> user. Error returned 'BH received type 1 NTLM token'
 This is the old problem of Squid advertising Negotiate authentication 
 but receiving NTLMv1 credentials from the browser.
 Kerberos begins with a type 2 token.
 The workaround in 3.1 and older has been to use the negotiate_wrapper 
 helper to detect the token type and support both NTLM or Kerberos 
 helpers for Negotiate. Unfortunately the wrapper seems to cause auth 
 failures in the new 3.2 architecture and we have not yet tracked that 
 bug down.
 Amos
Received on Tue Dec 13 2011 - 22:41:46 MST
This archive was generated by hypermail 2.2.0 : Wed Dec 14 2011 - 12:00:03 MST