<P>Hi,
<P>Thanks for your help! It turned out that because both the Kerberos server and client are on the same machine, the packets that the server sends out gets looped back -- so they don't travel all the way down the IP stack. In order for our client application to work, the packet needs to be processed by certain parts of the driver, so we're working on that problem now... Again, thanks for your time and help!
<P>Monica
<P>
<P><B><I>Sam Hartman <HARTMANS@MIT.EDU></I></B>wrote:
<BLOCKQUOTE style="BORDER-LEFT: #1010ff 2px solid; MARGIN-LEFT: 5px; PADDING-LEFT: 5px">You almost certainly have some sort of routing or IP misconfiguration,<BR>host name resolution problem or something like that.<BR><BR>In future, please do not remove details like IP addresses etc<BR>from your logs especially in situations where they might actually be<BR>useful to someone debugging your problem. If your identity or<BR>security requirements are such that you cannot even post your address<BR>or realm name, then perhaps you should hire someone and get them to<BR>sign an NDA rather than posting to a news group.<BR><BR><BR>I suspect that especially on Linux somehow localhost (127.0.0.1) is<BR>somehow involved either in the KDC request or the KDC response. This<BR>could be because resolving your kdc yields 127.0.0.1 on the KDC<BR>itself, because of some routing rules, or because of something I'm not<BR>thinking of.<BR><BR>________________________________________________<BR>Kerbero!
s mailing list Kerberos@mit.edu<BR>http://mailman.mit.edu/mailman/listinfo/kerberos</BLOCKQUOTE><p><br><hr size=1><b>Do You Yahoo!?</b><br>
<a href="http://health.yahoo.com/">Yahoo! Health</a> - Feel better, live better