HP CIFS Server and Kerberos

111
2. Test CIFS Server logins with a Windows AD user. Use a Windows user from the domain to
mount a share on the HP CIFS Server. To use Wireshark to verify the login, two traces must
be taken: one between the client and the KDC to observe that the TGS is correctly issued; and
another between the client and the HP CIFS Server to observe the client presenting the TGS
to the server and that the ticket is validated and share access is allowed.
Note that the Windows client has received a TGS that is very similar to the HP-UX user login, but the
service principal for this login is cifs/emonster.rose.hp.com. This proves that the cifs service principal
key that is resident in the merged keytab file is valid.