Help: gss_accept_sec_context() failed: Unspecified GSS failure. Minor code may provide more information (Unknown code krb5 230

Ken Raeburn raeburn at MIT.EDU
Tue Feb 3 11:29:35 EST 2009


On Feb 3, 2009, at 11:15, Omair Sajid wrote:
> Detailed error message from apache error log, we are on red hat  
> enterprise 5
>
> [Tue Feb 03 10:41:21 2009] [debug] src/mod_auth_kerb.c(1432): [client
> *.*.*.*] kerb_authenticate_user entered with user (NULL) and auth_type
> Kerberos
> [Tue Feb 03 10:41:21 2009] [debug] src/mod_auth_kerb.c(1432):
> [client *.*.*.*] kerb_authenticate_user entered with user (NULL) and
> auth_type Kerberos
> [Tue Feb 03 10:41:21 2009] [debug] src/mod_auth_kerb.c(1147):
> [client *.*.*.*] Acquiring creds for HTTP@*.*.*.*
> [Tue Feb 03 10:41:21 2009] [debug] src/mod_auth_kerb.c(1266):
> [client *.*.*.*] Verifying client data using KRB5 GSS-API
> [Tue Feb 03 10:41:21 2009] [debug] src/mod_auth_kerb.c(1282):
> [client *.*.*.*] Verification returned code 851968
> [Tue Feb 03 10:41:21 2009] [error] [client *.*.*.*]  
> gss_accept_sec_context()
> failed: Unspecified GSS failure.  Minor code may provide more  
> information
> (Unknown code krb5 230)

There may be some problem with initialization causing the error  
strings not to be accessible.  Error 230 in the krb5 table is  
KRB5_KT_KVNONOTFOUND, "Key version number for principal in key table  
is incorrect".  How did you set up the keytab file on the server?   
And, is the KDC for this realm an MIT KDC or Windows AD?  (If it's AD,  
I'm not familiar with the proper procedure for setting up a keytab for  
an application server running MIT code, but I'm sure others on this  
list are.)

Note that in the MIT code, the kadmin option for generating a keytab  
changes the key in the process, so if you ran it more than once (maybe  
on different machines?), then only the last one generated is going to  
be useful.

Also, check in case the client showing the problem has old credentials  
for the service cached using an earlier key version number and maybe  
the server only has a newer key; logging out and back in on the  
Windows box should avoid that problem.

Ken



More information about the Kerberos mailing list