Skip to main content

Kerberos high-level windows interface

Project description

kerberos-sspi

This Python package is API level equivalent to the kerberos python package but instead of using the MIT krb5 package it uses the windows sspi functionality. That allows your server and/or client that uses the kerberos package to run under windows by alternatively loading kerberos-sspi instead of the kerberos package.

(If you use python with cygwin you probably just use the original kerberos package with a compiled MIT kerberos package.)

How to use it

Here is an example:

try:
    import kerberos as k
except:
    import kerberos_sspi as k

from base64 import encodestring, decodestring

flags=k.GSS_C_CONF_FLAG|k.GSS_C_INTEG_FLAG|k.GSS_C_MUTUAL_FLAG|k.GSS_C_SEQUENCE_FLAG

errc, client = k.authGSSClientInit("test@vm-win7-kraemer", gssflags=flags)

# to run a kerberos enabled server under my account i do as domain admin:
#  setspn -A test/vm-win7-kraemer MYDOMAIN\kraemer
# (might have to wait a few minutes before all DCs in active directory pick it up)
errs, server = k.authGSSServerInit("test@vm-win7-kraemer")

cres = sres= k.AUTH_GSS_CONTINUE
response = ""
round = 0
while sres == k.AUTH_GSS_CONTINUE or cres == k.AUTH_GSS_CONTINUE:

    if cres == k.AUTH_GSS_CONTINUE:
        cres = k.authGSSClientStep(client, response)
        if cres == -1:
            print "clientstep error"
            break
        response = k.authGSSClientResponse(client)
    if sres == k.AUTH_GSS_CONTINUE:
        sres = k.authGSSServerStep(server, response)
        if sres == -1:
            print "serverstep error"
            break
        response = k.authGSSServerResponse(server)

    print "round:", round
    print "server status :", sres
    print "client status :", cres
    round += 1

if sres == k.AUTH_GSS_COMPLETE and cres == k.AUTH_GSS_COMPLETE:
    print "client: my username:", k.authGSSClientUserName(client)
    print "server: who authenticated to me:", k.authGSSServerUserName(server)
    print "server: my spn:", k.authGSSServerTargetName(server)
    print "********* encryption test ***********"
    err=k.authGSSClientWrap(client, encodestring("Hello"))
    if err == 1:
        encstring=k.authGSSClientResponse(client)
        print "encstring:", encstring, encodestring("Hello")
        decerr=k.authGSSClientUnwrap(server, encstring)
        if decerr == 1:
          encstring=k.authGSSServerResponse(server)
          print decodestring(encstring)

    # user case on wrap
    import struct
    import logging
    logging.basicConfig(level=logging.INFO)
    # set max size=1000 and server flags = AUTH_P_NONE|AUTH_P_INTEGRITY|AUTH_P_PRIVACY
    err=k.authGSSClientWrap(client, encodestring(struct.pack("!L", 1000 | 0x07000000)+"Hello"), user="may-day")
    if err == 1:
        encstring=k.authGSSClientResponse(client)
        print "encstring:", encstring, encodestring("Hello")
        decerr=k.authGSSClientUnwrap(server, encstring)
        if decerr == 1:
          encstring=k.authGSSServerResponse(server)
          print decodestring(encstring)

What’s not working

The methods:

  • changePassword

  • getServerPrincipalDetails

are not implemented and throw an exception

The flags:

  • GSS_C_ANON_FLAG

  • GSS_C_PROT_READY_FLAG

  • GSS_C_TRANS_FLAG

are not supported (and are not defined either so aceessing them will throw an exception as well). Why? I couldn’t find corresponding ISC_REQ_* for these flags…

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

kerberos-sspi-0.1.tar.gz (5.9 kB view hashes)

Uploaded source

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page