-
-
Notifications
You must be signed in to change notification settings - Fork 101
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Option to manually specify username/password #58
Comments
The whole point of Px was to avoid providing username/password, but I understand that means it only works on Windows and when part of the domain. I felt cntlm or NTLMaps filled that space already so didn't feel the need to explore it in Px. I'm curious to hear your thoughts on this feature though. |
Many users that require NTLM to access the internet use cntlm not only because it gives access to applications that don't support NTLM, but also because cntlm allows you to specify another account. Px works only if you are using the account on the network with a computer that is logged on to that domain. I often receive an AD account, but use my own laptop (local login) and then use cntlm to access the internet. Cntlm has difficulties on Win10 and it would be nice to switch over to something more modern. |
Same for me here. cntlm often dies or stops working. So itwould be really great if pxould receive an option to supply own credentials. |
I've looked into this for a couple days and it should be relatively easy to add this functionality. However, it brings some secondary questions to think about:-
Sharing to update on where we are with this and if there are any good ideas to deal with these design questions. |
@genotrance Sounds great. Indeed the password handling topic is not very straightforward. You first thoughts would be to use still Kerberos and therefore px needs the Domain credentials of a user right? So you cannot use any NetNTLMv2 hash for authentication? |
Yes, I need the raw password for something like ntlm-auth to generate the hashes for authentication. My current plan for Windows is to use Credentials Manager - if you want to provide credentials to Px, you would go to Credentials Manager and add a generic entry using its GUI. Then Px would get the credentials from CM and use it. This way, Px is neither responsible for the UI, storage or security of the credentials. There is still the concern of having the password in memory but that comes with the territory and will be documented. No idea on Linux yet but will cross that bridge when we get to it. Now, Px uses both pywin32 and winkerberos for NTLM and Kerberos respectively. Both support password based authentication as well as SSPI but are Windows specific, so I plan on using ntlm-auth for NTLM and kerberos for Kerberos since those are cross-platform and could eventually work on Linux as well. These will only be used for password based auth and SSPI will still stay as it is. I do not have a Kerberos setup to test against so will have to depend on the community to verify that it works as expected. Open to feedback on this approach - let me know what you think. Github issues work fine but also feel free to join https://gitter.im/genotrance/px to chat about Px. |
Give me a ping, as soon as it could be tested :) |
I second this, CNTLM project has died. Leaving a huge gap for a maintained CLI driven cross-platform NTLM proxy solution |
I've just implemented this feature in the latest commit / vHEAD release. Please try it out and let me know your feedback. You need to setup your password as a generic credential using Credential Manager. I have updated the README with details. I've tested NTLM auth on my laptop but it is part of the domain and logged in with a domain account (SSPI ready) so it will help to test with a non-SSPI configuration. Second, I have implemented this for Kerberos as well but do not have a server to test against so that's another use case that requires careful testing. Thanks in advance for your support! |
It seems to be working good. |
Is this NTLM or Kerberos? |
NTLM (but it's not visible in the logs, is it?) |
Yes it shows up in the logs.
You should also see the following in place of pywin32 SSPI to confirm.
|
|
Can you please share the full log? |
I was getting "An established connection was aborted by the software in your host machine". Turned Symantec firewall off and now I can see:
However it's not working, getting 407's for every request. -- |
Yes - if it doesn't find an equivalent password in credentials manager, it will fall back to pywin32 SSPI. You can see Have you whitelisted the px or Python binary in the firewall? |
No description provided.
The text was updated successfully, but these errors were encountered: