MIT vs. Heimdal/Sun: "Decrypt integrity check failed"
Karsten Petersen
kapet at hrz.tu-chemnitz.de
Thu Jun 3 05:08:19 EDT 2004
Hi,
we have a KDC (Heimdal 0.6.2) running for a test. kinit works, it
successfully provides users with krb4 and krb5 TGTs.
But now I am trying to write a simple GSS based program and get an
error which I can not clearly classify:
0. A service principal was created on the KDC. A krb5 keytab on the
GSS test machine was created by calling Heimdal's kadmin with
"ext_keytab *hostname*". The keytab contains 10 different
encryptions of the service key. The user calling the GSS client-app
always has a clean ticket cache with only the krb5 TGT in it.
1. GSS client- and server-app on the GSS test machine both use MIT
Kerberos5 1.3.1. This works like a charm. I will use this GSS
server-app for all further tests.
2. The GSS client-app on another machine, also using MIT Kerberos5
1.3.1, works too.
3. The GSS client-app using Heimdal 0.6.2 on just another Linux machine
does not work.
4. The GSS client-app on SunOS 5.8 (using Sun's GSS-implementation) does
not work either.
The GSS server-app shows the same error message for 3. and 4.:
gss_accept_sec_context: Miscellaneous failure
gss_accept_sec_context: Decrypt integrity check failed
(The GSS client-app then gets an error message from the server and quits
also.)
I traced the GSS server-app (during 3.) and found it calculating a MD5
sum (it was using des-cbc-md5) which came out different than the one
from the client.
So where is the problem?
Thanks in advance,
Karsten Petersen
--
Dipl. Inf. Karsten Petersen, Universitaetsrechenzentrum, TU Chemnitz
E-Mail: kapet at hrz.tu-chemnitz.de
Telefon: (0371) - 531 - 1725
Arbeitsplatz: Strasse der Nationen 62 // Raum 1/B301.A
More information about the Kerberos
mailing list