From a40ce5d0d9d06f592a8885162bbaf644006b9f0f Mon Sep 17 00:00:00 2001 From: Andrew Bartlett Date: Mon, 27 Jul 2009 22:04:26 +1000 Subject: s4:kerberos Add 'net export keytab' command for wireshark decryption It is much easier to do decryption with wireshark when the keytab is available for every host in the domain. Running 'net export keytab ' will export the current (as pointed to by the supplied smb.conf) local Samba4 doamin. (This uses Heimdal's 'hdb' keytab and then the existing hdb-samba4, and so has a good chance of keeping working in the long term). Andrew Bartlett --- source4/utils/net/config.mk | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) (limited to 'source4/utils/net/config.mk') diff --git a/source4/utils/net/config.mk b/source4/utils/net/config.mk index b2f0fcf6b1..ff8cb2c526 100644 --- a/source4/utils/net/config.mk +++ b/source4/utils/net/config.mk @@ -21,7 +21,8 @@ net_OBJ_FILES = $(addprefix $(utilssrcdir)/net/, \ net_time.o \ net_join.o \ net_vampire.o \ - net_user.o) + net_user.o \ + net_export_keytab.o) $(eval $(call proto_header_template,$(utilssrcdir)/net/net_proto.h,$(net_OBJ_FILES:.o=.c))) -- cgit