No permission to acquire Kerberos accept credential

Don Alex alexmunoz at uniandes.edu.co
Sat Nov 13 21:28:26 EST 2004


Hi

I'm trying to make run an example found on the java.sun.com web site. 
This example is issued of a paper called "Use of JAAS utility and Java
GSS-API for Secure Message Exchanges" and is based on JAAS and the
GSS-API.

My environment is:
KDC: SEAM by Solaris 9 (alse some times Windows 2003)
Client: Solaris 9 Sparc
Server: Solaris 9 Sparc
Java: 1.5.0-b64

But i have two erros, in a server and the client:
Server: SecurityException No permission to acquire Kerberos accept
credential
Client: GSSException: Security context init/accept not yet called or
context deleted (Mechanism level: verifyMIC called in invalid state!)

SERVER
Debug is  true storeKey true useTicketCache false useKeyTab false
doNotPrompt false ticketCache is null KeyTab is null refreshKrb5Config
is false principal is mquiroga/utria.uniandes.edu.co at UNIANDES.EDU.CO
tryFirstPass is false useFirstPass is false storePass is false
clearPass is false
Kerberos password for mquiroga/utria.uniandes.edu.co at UNIANDES.EDU.CO:
mi
                [Krb5LoginModule] user entered username:
mquiroga/utria.uniandes.edu.co at UNIANDES.EDU.CO

Using builtin default etypes for default_tkt_enctypes
default etypes for default_tkt_enctypes: 3 1 16.
principal is mquiroga/utria.uniandes.edu.co at UNIANDES.EDU.CO
Acquire TGT using AS Exchange
EncryptionKey: keyType=3 keyBytes (hex dump)=0000: 19 94 76 64 26 83
CB 54
EncryptionKey: keyType=1 keyBytes (hex dump)=0000: 19 94 76 64 26 83
CB 54
EncryptionKey: keyType=16 keyBytes (hex dump)=0000: D0 E6 1A B5 D9 70
D6 8C   67 D6 3E 20 1C DF 32 C4  .....p..g.> ..2.
0010: 32 A2 C2 4C FE DF AE D6   
Using builtin default etypes for default_tkt_enctypes
default etypes for default_tkt_enctypes: 3 1 16.
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> KrbAsReq calling createMessage
>>> KrbAsReq in createMessage
>>> KrbKdcReq send: kdc=utria.uniandes.edu.co UDP:88, timeout=30000,
number of retries =3, #bytes=256
>>> KDCCommunication: kdc=utria.uniandes.edu.co UDP:88,
timeout=30000,Attempt =1, #bytes=256
>>> KrbKdcReq send: #bytes read=562
>>> KrbKdcReq send: #bytes read=562
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> KrbAsRep cons in KrbAsReq.getReply mquiroga/utria.uniandes.edu.co
Added server's keyKerberos Principal
mquiroga/utria.uniandes.edu.co at UNIANDES.EDU.COKey Version 0key
EncryptionKey: keyType=3 keyBytes (hex dump)=
0000: 19 94 76 64 26 83 CB 54   

                [Krb5LoginModule] added Krb5Principal 
mquiroga/utria.uniandes.edu.co at UNIANDES.EDU.CO to Subject
Added server's keyKerberos Principal
mquiroga/utria.uniandes.edu.co at UNIANDES.EDU.COKey Version 0key
EncryptionKey: keyType=1 keyBytes (hex dump)=
0000: 19 94 76 64 26 83 CB 54   

                [Krb5LoginModule] added Krb5Principal 
mquiroga/utria.uniandes.edu.co at UNIANDES.EDU.CO to Subject
Added server's keyKerberos Principal
mquiroga/utria.uniandes.edu.co at UNIANDES.EDU.COKey Version 0key
EncryptionKey: keyType=16 keyBytes (hex dump)=
0000: D0 E6 1A B5 D9 70 D6 8C   67 D6 3E 20 1C DF 32 C4  .....p..g.>
..2.
0010: 32 A2 C2 4C FE DF AE D6   

                [Krb5LoginModule] added Krb5Principal 
mquiroga/utria.uniandes.edu.co at UNIANDES.EDU.CO to Subject
Commit Succeeded 

Waiting for incoming connection...
Got connection from client /157.253.50.59
Will READ input token of size 518 for processing by acceptSecContext
Found key for mquiroga/utria.uniandes.edu.co at UNIANDES.EDU.CO(16)
Found key for mquiroga/utria.uniandes.edu.co at UNIANDES.EDU.CO(1)
Found key for mquiroga/utria.uniandes.edu.co at UNIANDES.EDU.CO(3)
Esto es una SecurityException No permission to acquire Kerberos accept
credential
java.lang.SecurityException: No permission to acquire Kerberos accept
credential
        at sun.security.jgss.krb5.Krb5MechFactory.checkAcceptCredPermission(Krb5MechFactory.java:119)
        at sun.security.jgss.krb5.Krb5MechFactory.getCredentialElement(Krb5MechFactory.java:79)
        at sun.security.jgss.GSSManagerImpl.getCredentialElement(GSSManagerImpl.java:149)
        at sun.security.jgss.GSSCredentialImpl.add(GSSCredentialImpl.java:389)
        at sun.security.jgss.GSSCredentialImpl.<init>(GSSCredentialImpl.java:45)
        at sun.security.jgss.GSSManagerImpl.createCredential(GSSManagerImpl.java:102)
        at sun.security.jgss.GSSContextImpl.acceptSecContext(GSSContextImpl.java:277)
        at sun.security.jgss.GSSContextImpl.acceptSecContext(GSSContextImpl.java:246)
        at SampleServer.main(SampleServer.java:123)
        at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
        at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:39)
        at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25)
        at java.lang.reflect.Method.invoke(Method.java:585)
        at MyAction.run(Login.java:225)
        at java.security.AccessController.doPrivileged(Native Method)
        at javax.security.auth.Subject.doAsPrivileged(Subject.java:517)
        at Login.main(Login.java:187)
Esto es una SecurityException No permission to acquire Kerberos accept
credential
Will send token of size 518 from acceptSecContext.
Esto es PrivilegedActionException - INI
java.lang.reflect.InvocationTargetException
        at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
        at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:39)
        at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25)
        at java.lang.reflect.Method.invoke(Method.java:585)
        at MyAction.run(Login.java:225)
        at java.security.AccessController.doPrivileged(Native Method)
        at javax.security.auth.Subject.doAsPrivileged(Subject.java:517)
        at Login.main(Login.java:187)
Caused by: java.io.EOFException
        at java.io.DataInputStream.readInt(DataInputStream.java:358)
        at SampleServer.main(SampleServer.java:118)
        ... 8 more
Esto es PrivilegedActionException - FIN


CLIENT
Debug is  true storeKey false useTicketCache false useKeyTab false
doNotPrompt false ticketCache is null KeyTab is null refreshKrb5Config
is false principal is alexmunoz/utria.uniandes.edu.co at UNIANDES.EDU.CO
tryFirstPass is false useFirstPass is false storePass is false
clearPass is false
Kerberos password for alexmunoz/utria.uniandes.edu.co at UNIANDES.EDU.CO:
al
                [Krb5LoginModule] user entered username:
alexmunoz/utria.uniandes.edu.co at UNIANDES.EDU.CO

Using builtin default etypes for default_tkt_enctypes
default etypes for default_tkt_enctypes: 3 1 16.
principal is alexmunoz/utria.uniandes.edu.co at UNIANDES.EDU.CO
Acquire TGT using AS Exchange
EncryptionKey: keyType=3 keyBytes (hex dump)=0000: B9 86 13 75 13 2C
AB F1
EncryptionKey: keyType=1 keyBytes (hex dump)=0000: B9 86 13 75 13 2C
AB F1
EncryptionKey: keyType=16 keyBytes (hex dump)=0000: AD 58 02 92 1A 5E
B9 C2   BA 6D B0 64 0B 70 AE 1F  .X...^...m.d.p..
0010: 6D 98 C8 16 68 A4 16 19   
Using builtin default etypes for default_tkt_enctypes
default etypes for default_tkt_enctypes: 3 1 16.
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> KrbAsReq calling createMessage
>>> KrbAsReq in createMessage
>>> KrbKdcReq send: kdc=utria.uniandes.edu.co UDP:88, timeout=30000,
number of retries =3, #bytes=257
>>> KDCCommunication: kdc=utria.uniandes.edu.co UDP:88,
timeout=30000,Attempt =1, #bytes=257
>>> KrbKdcReq send: #bytes read=563
>>> KrbKdcReq send: #bytes read=563
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> KrbAsRep cons in KrbAsReq.getReply alexmunoz/utria.uniandes.edu.co
Commit Succeeded 

Found ticket for alexmunoz/utria.uniandes.edu.co at UNIANDES.EDU.CO to go
to krbtgt/UNIANDES.EDU.CO at UNIANDES.EDU.CO expiring on Sun Nov 14
05:27:01 COT 2004
Entered Krb5Context.initSecContext with state=STATE_NEW
Found ticket for alexmunoz/utria.uniandes.edu.co at UNIANDES.EDU.CO to go
to krbtgt/UNIANDES.EDU.CO at UNIANDES.EDU.CO expiring on Sun Nov 14
05:27:01 COT 2004
Service ticket not found in the subject
>>> Credentials acquireServiceCreds: same realm
Using builtin default etypes for default_tgs_enctypes
default etypes for default_tgs_enctypes: 3 1 16.
>>> CksumType: sun.security.krb5.internal.crypto.RsaMd5CksumType
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> KrbKdcReq send: kdc=utria.uniandes.edu.co UDP:88, timeout=30000,
number of retries =3, #bytes=620
>>> KDCCommunication: kdc=utria.uniandes.edu.co UDP:88,
timeout=30000,Attempt =1, #bytes=620
>>> KrbKdcReq send: #bytes read=558
>>> KrbKdcReq send: #bytes read=558
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> KrbApReq: APOptions are 00100000 00000000 00000000 00000000
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Krb5Context setting mySeqNumber to: -2692
Created InitSecContextToken:
0000: 30 31 20 30 30 20 36 65   20 38 32 20 30 31 20 66  01 00 6e 82
01 f
0010: 31 20 33 30 20 38 32 20   30 31 20 65 64 20 61 30  1 30 82 01 ed
a0
0020: 20 30 33 20 30 32 20 30   31 20 30 35 20 61 31 20   03 02 01 05
a1
0030: 30 33 20 30 32 20 30 31   20 30 65 20 61 32 20 30  03 02 01 0e
a2 0
0040: 37 20 30 33 20 30 35 20   30 30 20 32 30 20 30 30  7 03 05 00 20
00
0050: 20 30 30 20 30 30 20 61   33 20 38 31 20 66 65 20   00 00 a3 81
fe
0060: 36 31 20 38 31 20 66 62   20 33 30 20 38 31 20 66  61 81 fb 30
81 f
0070: 38 20 61 30 20 30 33 20   30 32 20 30 31 20 30 35  8 a0 03 02 01
05
0080: 20 61 31 20 31 31 20 31   62 20 30 66 20 35 35 20   a1 11 1b 0f
55
0090: 34 65 20 34 39 20 34 31   20 34 65 20 34 34 20 34  4e 49 41 4e
44 4
00A0: 35 20 35 33 20 32 65 20   34 35 20 34 34 20 35 35  5 53 2e 45 44
55
00B0: 20 32 65 20 34 33 20 34   66 20 61 32 20 32 35 20   2e 43 4f a2
25
00C0: 33 30 20 32 33 20 61 30   20 30 33 20 30 32 20 30  30 23 a0 03
02 0
00D0: 31 20 30 30 20 61 31 20   31 63 20 33 30 20 31 61  1 00 a1 1c 30
1a
00E0: 20 31 62 20 30 37 20 36   62 20 37 32 20 36 32 20   1b 07 6b 72
62
00F0: 37 34 20 36 37 20 37 34   20 33 32 20 31 62 20 30  74 67 74 32
1b 0
0100: 66 20 35 35 20 34 65 20   34 39 20 34 31 20 34 65  f 55 4e 49 41
4e
0110: 20 34 34 20 34 35 20 35   33 20 32 65 20 34 35 20   44 45 53 2e
45
0120: 34 34 20 35 35 20 32 65   20 34 33 20 34 66 20 61  44 55 2e 43
4f a
0130: 33 20 38 31 20 62 36 20   33 30 20 38 31 20 62 33  3 81 b6 30 81
b3
0140: 20 61 30 20 30 33 20 30   32 20 30 31 20 30 31 20   a0 03 02 01
01
0150: 61 32 20 38 31 20 61 62   20 30 34 20 38 31 20 61  a2 81 ab 04
81 a
0160: 38 20 32 33 20 38 33 20   38 66 20 62 39 20 38 64  8 23 83 8f b9
8d
0170: 20 30 39 20 61 39 20 35   61 20 66 65 20 35 31 20   09 a9 5a fe
51
0180: 39 31 20 66 34 20 39 65   20 61 36 20 61 64 20 32  91 f4 9e a6
ad 2
0190: 36 20 36 37 20 32 66 20   36 31 20 35 66 20 63 30  6 67 2f 61 5f
c0
01A0: 20 66 37 20 32 34 20 34   32 20 66 30 20 33 39 20   f7 24 42 f0
39
01B0: 34 63 20 61 35 20 61 38   20 63 37 20 34 63 20 37  4c a5 a8 c7
4c 7
01C0: 38 20 36 65 20 34 30 20   33 32 20 61 35 20 34 35  8 6e 40 32 a5
45
01D0: 20 31 33 20 38 62 20 39   34 20 32 36 20 33 62 20   13 8b 94 26
3b
01E0: 31 63 20 66 61 20 62 37   20 33 37 20 39 63 20 37  1c fa b7 37
9c 7
01F0: 31 20 35 62 20 36 65 20   63 33 20 64 66 20 64 33  1 5b 6e c3 df
d3
0200: 20 62 33 20 37 36 20 63   39 20 33 38 20 61 33 20   b3 76 c9 38
a3
0210: 63 36 20 33 64 20 30 39   20 33 35 20 62 65 20 63  c6 3d 09 35
be c
0220: 61 20 30 31 20 66 35 20   62 39 20 31 34 20 33 39  a 01 f5 b9 14
39
0230: 20 32 30 20 66 34 20 66   37 20 62 61 20 66 64 20   20 f4 f7 ba
fd
0240: 37 61 20 61 30 20 61 65   20 36 62 20 62 39 20 35  7a a0 ae 6b
b9 5
0250: 36 20 30 34 20 37 31 20   31 66 20 64 32 20 65 34  6 04 71 1f d2
e4
0260: 20 34 33 20 62 63 20 35   38 20 39 66 20 63 32 20   43 bc 58 9f
c2
0270: 38 39 20 66 64 20 61 31   20 30 64 20 37 31 20 61  89 fd a1 0d
71 a
0280: 32 20 32 34 20 38 39 20   63 34 20 35 32 20 39 37  2 24 89 c4 52
97
0290: 20 34 38 20 39 30 20 34   66 20 65 33 20 34 39 20   48 90 4f e3
49
02A0: 35 39 20 30 30 20 63 38   20 35 62 20 39 37 20 39  59 00 c8 5b
97 9
02B0: 64 20 31 34 20 33 31 20   33 34 20 33 62 20 65 38  d 14 31 34 3b
e8
02C0: 20 30 36 20 35 66 20 64   62 20 34 62 20 35 35 20   06 5f db 4b
55
02D0: 30 34 20 33 31 20 30 61   20 32 61 20 34 35 20 32  04 31 0a 2a
45 2
02E0: 37 20 63 66 20 63 34 20   63 31 20 30 34 20 39 61  7 cf c4 c1 04
9a
02F0: 20 34 39 20 63 39 20 35   66 20 34 30 20 63 63 20   49 c9 5f 40
cc
0300: 31 35 20 32 37 20 35 61   20 38 37 20 66 37 20 63  15 27 5a 87
f7 c
0310: 65 20 30 63 20 34 38 20   62 31 20 38 33 20 33 34  e 0c 48 b1 83
34
0320: 20 61 35 20 35 30 20 30   37 20 33 34 20 33 30 20   a5 50 07 34
30
0330: 63 34 20 34 32 20 33 63   20 36 32 20 31 32 20 62  c4 42 3c 62
12 b
0340: 38 20 35 33 20 62 37 20   38 62 20 39 66 20 36 39  8 53 b7 8b 9f
69
0350: 20 35 66 20 64 36 20 37   32 20 61 34 20 38 31 20   5f d6 72 a4
81
0360: 64 36 20 33 30 20 38 31   20 64 33 20 61 30 20 30  d6 30 81 d3
a0 0
0370: 33 20 30 32 20 30 31 20   30 33 20 61 32 20 38 31  3 02 01 03 a2
81
0380: 20 63 62 20 30 34 20 38   31 20 63 38 20 63 36 20   cb 04 81 c8
c6
0390: 65 38 20 65 34 20 36 39   20 31 33 20 66 39 20 38  e8 e4 69 13
f9 8
03A0: 38 20 62 34 20 37 39 20   65 30 20 30 35 20 36 35  8 b4 79 e0 05
65
03B0: 20 64 37 20 64 34 20 61   37 20 37 34 20 38 63 20   d7 d4 a7 74
8c
03C0: 35 35 20 66 33 20 61 64   20 30 39 20 34 32 20 64  55 f3 ad 09
42 d
03D0: 34 20 64 64 20 35 65 20   66 35 20 34 34 20 63 64  4 dd 5e f5 44
cd
03E0: 20 61 65 20 35 33 20 38   65 20 66 36 20 35 65 20   ae 53 8e f6
5e
03F0: 34 32 20 35 39 20 63 31   20 33 37 20 35 34 20 30  42 59 c1 37
54 0
0400: 38 20 64 33 20 39 64 20   38 33 20 62 61 20 65 35  8 d3 9d 83 ba
e5
0410: 20 63 35 20 61 36 20 64   64 20 35 66 20 31 65 20   c5 a6 dd 5f
1e
0420: 38 36 20 64 30 20 31 31   20 33 38 20 31 39 20 38  86 d0 11 38
19 8
0430: 35 20 63 65 20 64 30 20   62 33 20 32 35 20 66 34  5 ce d0 b3 25
f4
0440: 20 63 36 20 38 62 20 62   37 20 34 63 20 35 39 20   c6 8b b7 4c
59
0450: 32 30 20 33 35 20 33 63   20 35 66 20 33 65 20 34  20 35 3c 5f
3e 4
0460: 66 20 63 39 20 30 36 20   33 66 20 38 61 20 33 37  f c9 06 3f 8a
37
0470: 20 62 35 20 39 33 20 62   65 20 36 61 20 66 33 20   b5 93 be 6a
f3
0480: 37 38 20 62 61 20 65 66   20 32 38 20 39 35 20 65  78 ba ef 28
95 e
0490: 36 20 38 64 20 64 34 20   66 64 20 61 62 20 33 37  6 8d d4 fd ab
37
04A0: 20 33 34 20 37 36 20 35   38 20 33 62 20 32 34 20   34 76 58 3b
24
04B0: 37 37 20 31 62 20 63 61   20 65 30 20 38 63 20 31  77 1b ca e0
8c 1
04C0: 37 20 65 65 20 64 38 20   66 34 20 63 31 20 38 65  7 ee d8 f4 c1
8e
04D0: 20 61 37 20 31 64 20 63   63 20 34 62 20 36 34 20   a7 1d cc 4b
64
04E0: 39 36 20 38 31 20 37 63   20 62 62 20 37 39 20 39  96 81 7c bb
79 9
04F0: 66 20 38 62 20 38 37 20   66 32 20 35 30 20 61 33  f 8b 87 f2 50
a3
0500: 20 61 63 20 36 39 20 39   39 20 64 62 20 64 34 20   ac 69 99 db
d4
0510: 33 62 20 31 36 20 65 32   20 61 33 20 33 61 20 38  3b 16 e2 a3
3a 8
0520: 61 20 30 39 20 66 33 20   30 64 20 62 34 20 65 30  a 09 f3 0d b4
e0
0530: 20 35 33 20 30 32 20 37   39 20 63 39 20 34 36 20   53 02 79 c9
46
0540: 63 64 20 30 30 20 35 37   20 63 34 20 36 30 20 66  cd 00 57 c4
60 f
0550: 35 20 61 62 20 35 34 20   63 36 20 62 62 20 32 37  5 ab 54 c6 bb
27
0560: 20 33 66 20 61 33 20 30   30 20 32 38 20 37 38 20   3f a3 00 28
78
0570: 34 35 20 61 39 20 37 65   20 62 64 20 36 65 20 63  45 a9 7e bd
6e c
0580: 61 20 38 66 20 38 66 20   37 62 20 64 30 20 33 34  a 8f 8f 7b d0
34
0590: 20 30 32 20 65 37 20 30   35 20 30 32 20 33 37 20   02 e7 05 02
37
05A0: 32 32 20 32 35 20 38 32   20 32 33 20 65 32 20 63  22 25 82 23
e2 c
05B0: 61 20 38 39 20 39 36 20   63 39 20 32 33 20 39 64  a 89 96 c9 23
9d
05C0: 20 32 38 20 32 39 20 64   66 20 34 34 20 30 31 20   28 29 df 44
01
05D0: 38 39 20 63 64 20 37 36   20 37 66 20 65 32 20 39  89 cd 76 7f
e2 9
05E0: 66 20 33 63 20 
Context Established! 
Client is alexmunoz/utria.uniandes.edu.co at UNIANDES.EDU.CO
Server is krbtgt2/UNIANDES.EDU.CO at UNIANDES.EDU.CO
Remaining lifetime in seconds = 2147483647
Context mechanism = 1.2.840.113554.1.2.2
Initiator = alexmunoz/utria.uniandes.edu.co at UNIANDES.EDU.CO
Acceptor = krbtgt2/UNIANDES.EDU.CO at UNIANDES.EDU.CO
Confidentiality (i.e., privacy) is available
Integrity is available
Mutual authentication took place!
QoP es: 0 org.ietf.jgss.MessageProp at 1b000e7
Krb5Context.wrap: data=[48 65 6c 6c 6f 20 54 68 65 72 65 21 00 ]
Esto es una GSSException de wrap Security context init/accept not yet
called or context deleted (Mechanism level: Wrap called in invalid
state!)
GSSException: Security context init/accept not yet called or context
deleted (Mechanism level: Wrap called in invalid state!)
        at sun.security.jgss.krb5.Krb5Context.wrap(Krb5Context.java:785)
        at sun.security.jgss.GSSContextImpl.wrap(GSSContextImpl.java:342)
        at SampleClient.main(SampleClient.java:244)
        at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
        at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:39)
        at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25)
        at java.lang.reflect.Method.invoke(Method.java:585)
        at MyAction.run(Login.java:225)
        at java.security.AccessController.doPrivileged(Native Method)
        at javax.security.auth.Subject.doAsPrivileged(Subject.java:517)
        at Login.main(Login.java:187)
Esto es una GSSException de wrap Security context init/accept not yet
called or context deleted (Mechanism level: Wrap called in invalid
state!)
Will send wrap token of size 518
Will read token of size 518
Esto es una GSSException de la grande Security context init/accept not
yet called or context deleted (Mechanism level: verifyMIC called in
invalid state!)
GSSException: Security context init/accept not yet called or context
deleted (Mechanism level: verifyMIC called in invalid state!)
        at sun.security.jgss.krb5.Krb5Context.verifyMIC(Krb5Context.java:1040)
        at sun.security.jgss.GSSContextImpl.verifyMIC(GSSContextImpl.java:403)
        at SampleClient.main(SampleClient.java:267)
        at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
        at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:39)
        at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25)
        at java.lang.reflect.Method.invoke(Method.java:585)
        at MyAction.run(Login.java:225)
        at java.security.AccessController.doPrivileged(Native Method)
        at javax.security.auth.Subject.doAsPrivileged(Subject.java:517)
        at Login.main(Login.java:187)
Esto es una GSSException de la grande Security context init/accept not
yet called or context deleted (Mechanism level: verifyMIC called in
invalid state!)


More information about the Kerberos mailing list