mirror of
https://github.com/samba-team/samba.git
synced 2025-01-25 06:04:04 +03:00
47a7a2e442
It is much easier to do decryption with wireshark when the keytab is available for every host in the domain. Running 'net export keytab <keytab name>' will export the current (as pointed to by the supplied smb.conf) local Samba4 doamin. (This uses Heimdal's 'hdb' keytab and then the existing hdb-samba4, and so has a good chance of keeping working in the long term). Andrew Bartlett
20 lines
576 B
Makefile
20 lines
576 B
Makefile
#################################
|
|
# Start SUBSYSTEM KERBEROS
|
|
[SUBSYSTEM::KERBEROS]
|
|
PUBLIC_DEPENDENCIES = HEIMDAL_KRB5 NDR_KRB5PAC samba_socket LIBCLI_RESOLVE
|
|
PRIVATE_DEPENDENCIES = ASN1_UTIL auth_sam_reply LIBTEVENT LIBPACKET LIBNDR
|
|
# End SUBSYSTEM KERBEROS
|
|
#################################
|
|
|
|
KERBEROS_OBJ_FILES = $(addprefix $(authsrcdir)/kerberos/, \
|
|
kerberos.o \
|
|
clikrb5.o \
|
|
kerberos_heimdal.o \
|
|
kerberos_pac.o \
|
|
gssapi_parse.o \
|
|
krb5_init_context.o \
|
|
keytab_copy.o)
|
|
|
|
$(eval $(call proto_header_template,$(authsrcdir)/kerberos/proto.h,$(KERBEROS_OBJ_FILES:.o=.c)))
|
|
|