Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Details about using CredSSP in Windows #36

Merged
merged 1 commit into from
Mar 28, 2016

Conversation

bostko
Copy link
Contributor

@bostko bostko commented Mar 24, 2016

@aledsage can you review.

https://technet.microsoft.com/en-us/library/hh849719.aspx#sectionSection4

To use `Invoke-Command -Authentication CredSSP` the Windows Machine has to have:
- Up and running WinRM over http
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

or https?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

http as well

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

So can you change the wording so that it does not imply that it must be http?

Or are you saying that it must have http enabled?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I am saying that it must have http enabled.
The custom-enable-credssp script does everything needed.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@bostko I thought we were using https with winrm4j now. Are we using http just for this? So do we enable both? Or just one of them?

In separate communication, you said about an error for MSSQL@Azure: NoSuchElementException: could not connect to any socket in [40.68.36.154:5986, 100.89.232.98:5986]. That is the https port, so I assumed we were using https.

@aledsage
Copy link
Contributor

@neykov any comments from you about the need for http and https when we're using Invoke-Command -Authentication CredSSP?

script which enables executing commands with CredSSP in the general case.
The script works for most of the Windows images out there version 2008 and later.

Please ensure that Brooklyn's changes are compatible with your organisation's security policy.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

[nit] US English s/s/z/

@ahgittin
Copy link
Contributor

useful. @neykov if you have any comments on http(s) (re aled's comment above) it can be a new PR

@asfgit asfgit merged commit 6db8984 into apache:master Mar 28, 2016
asfgit pushed a commit that referenced this pull request Mar 28, 2016
@neykov
Copy link
Member

neykov commented Mar 28, 2016

@aledsage Invoke-Command will default to http transport (the authentication protocol doesn't matter). The script can override it, but then needs to know what settings to use (what's available on the machine).
So the solution is to either enable http for loopback or somehow figure out what's available and use that.

@bostko can you confirm

Also the self signed certificate might be a problem for Invoke-Command - should be fine for localhost where it's already trusted, but for other cases need to use Enter-PSSession beforehand with ignore option.

@bostko
Copy link
Contributor Author

bostko commented Mar 28, 2016

@neykov indeed. The script does what you wrote.
It enables winrm and adds machine's ip and localhost to trusted remote hosts.

@bostko bostko deleted the winrm_port_sensor branch September 4, 2016 20:31
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
6 participants