On 03.12.2010, at 21:51, Tyler Gibbons wrote:
> And then a sample error message (all are alike at this point):
>
> [Fri Dec 03 12:44:27 2010] [warn] [client 210.124.56.213] TKT
> valid_ticket: unparseable cookie ticket found ('uid%3Dkavec
> %3Bvaliduntil%3D1292618657%3Bcip%3D210.124.56.213%3Btokens%3Dadmin
> %3Budata%3DThis%20is%20Kavec%3Bsig
> %3DR5zZTWYOkWppxOxWDfiG8ZJDWBshRWI5i0TwxLGI01B29TptqDZqiMTYST5rdBev
> %0AjLTxH9ljJzIsAl%2BSeEqg4w5mv7zyQKuPLuuiAUbDyt4m83ezbU%2FM11YKDFLbZgFm
> %0AbxVQJZ5bGv5bUp6Ln01V7OYgE%2Bw6nVE999NBtfZU6lk%3D')
Ummmm do you have mod_auth_tkt installed instead of (or in addition to) mod_auth_pubtkt? Because that error message isn't from mod_auth_pubtkt ;)
Also, if the URL encoding of the cookie data above is to be believed, there are stray line feeds (%0A) in the signature.
Regards,
Manuel
> However, that's missing two flags and will get a bunch of extra
> newlines in it. Instead, you need to:
>
> echo -n "uid=foobar;validuntil=123456789;tokens=;udata=" \
> | openssl dgst -dss1 -sign privkey.pem \
> | openssl enc -base64 -A
Thanks; I've updated the page accordingly. Glad to hear it works now!
- Manuel