MIT-Heimdal interop issues

Digant Kasundra digant at uta.edu
Tue Mar 23 18:42:09 EST 2004


The klist (Heimdal) on the client shows:

Credentials cache: FILE:/tmp/krb5cc_0
        Principal: digant at KERB.UTA.EDU
    Cache version: 4
 
Server: krbtgt/KERB.UTA.EDU at KERB.UTA.EDU
Ticket etype: des-cbc-crc, kvno 1
Session key: des-cbc-md4
Auth time:  Mar 23 17:42:20 2004
End time:   Mar 24 00:20:45 2004
Ticket flags: initial
Addresses: IPv4:129.107.56.202
 
Server: ldap/omicron.kerb.uta.edu at KERB.UTA.EDU
Ticket etype: des-cbc-crc, kvno 3
Session key: des-cbc-md4
Auth time:  Mar 23 17:42:20 2004
Start time: Mar 23 17:42:36 2004
End time:   Mar 24 00:20:45 2004
Ticket flags: transited-policy-checked
Addresses: IPv4:129.107.56.202




And the krb5kdc.log on the server (MIT Kerberos) shows:

Mar 23 17:42:36 labrador.uta.edu krb5kdc[11571](info): TGS_REQ (6 etypes {16
5 23 3 2 1}) 129.107.56.202: ISSUE: authtime 1080085340, etypes {rep=2 tkt=1
ses=2}, digant at KERB.UTA.EDU for ldap/omicron.kerb.uta.edu at KERB.UTA.EDU



-----Original Message-----
From: Sam Hartman
To: Digant Kasundra
Cc: ''kerberos at mit.edu' '
Sent: 3/23/2004 5:22 PM
Subject: Re: MIT-Heimdal interop issues

>>>>> "Digant" == Digant Kasundra <digant at uta.edu> writes:

    Digant> Well, for some reason, I'm not getting good results.
    Digant> getting a ticket with kinit on the heimdal side works
    Digant> great if I specify a password.  But when using a keytab,
    Digant> it will only work if I tell it manually what encryption
    Digant> type to use, even though ktutil identifies the enc type
    Digant> correctly when listing the keys in that keytab.

This doesn't completely surprise me if your KDC requires
preauthentication.  If so, it is a Heimdal bug.  MIT has the same bug
though; it is easy to make.

    Digant> I think this is the major contributor to my gssapi bind
    Digant> failing on openldap.

However the need to specify the enctype for kinit should not affect
use for GSSAPI bind on the server side doing a gss_accept_sec_context.

I'd look in your MIT KDC log and make sure the enctype for the ticket
that is issued (tkt in the log line for the tgs_req) is something that
is in your keytab.

Perhaps posting klist -5 -e output from your client with an ldap
ticket and posting the appropriate ktutil output to show the enctypes
would be enlightening.

--Sam


More information about the Kerberos mailing list