No permission to acquire Kerberos accept credential
Don Alex
alexmunoz at uniandes.edu.co
Sat Nov 13 21:28:26 EST 2004
Hi
I'm trying to make run an example found on the java.sun.com web site.
This example is issued of a paper called "Use of JAAS utility and Java
GSS-API for Secure Message Exchanges" and is based on JAAS and the
GSS-API.
My environment is:
KDC: SEAM by Solaris 9 (alse some times Windows 2003)
Client: Solaris 9 Sparc
Server: Solaris 9 Sparc
Java: 1.5.0-b64
But i have two erros, in a server and the client:
Server: SecurityException No permission to acquire Kerberos accept
credential
Client: GSSException: Security context init/accept not yet called or
context deleted (Mechanism level: verifyMIC called in invalid state!)
SERVER
Debug is true storeKey true useTicketCache false useKeyTab false
doNotPrompt false ticketCache is null KeyTab is null refreshKrb5Config
is false principal is mquiroga/utria.uniandes.edu.co at UNIANDES.EDU.CO
tryFirstPass is false useFirstPass is false storePass is false
clearPass is false
Kerberos password for mquiroga/utria.uniandes.edu.co at UNIANDES.EDU.CO:
mi
[Krb5LoginModule] user entered username:
mquiroga/utria.uniandes.edu.co at UNIANDES.EDU.CO
Using builtin default etypes for default_tkt_enctypes
default etypes for default_tkt_enctypes: 3 1 16.
principal is mquiroga/utria.uniandes.edu.co at UNIANDES.EDU.CO
Acquire TGT using AS Exchange
EncryptionKey: keyType=3 keyBytes (hex dump)=0000: 19 94 76 64 26 83
CB 54
EncryptionKey: keyType=1 keyBytes (hex dump)=0000: 19 94 76 64 26 83
CB 54
EncryptionKey: keyType=16 keyBytes (hex dump)=0000: D0 E6 1A B5 D9 70
D6 8C 67 D6 3E 20 1C DF 32 C4 .....p..g.> ..2.
0010: 32 A2 C2 4C FE DF AE D6
Using builtin default etypes for default_tkt_enctypes
default etypes for default_tkt_enctypes: 3 1 16.
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> KrbAsReq calling createMessage
>>> KrbAsReq in createMessage
>>> KrbKdcReq send: kdc=utria.uniandes.edu.co UDP:88, timeout=30000,
number of retries =3, #bytes=256
>>> KDCCommunication: kdc=utria.uniandes.edu.co UDP:88,
timeout=30000,Attempt =1, #bytes=256
>>> KrbKdcReq send: #bytes read=562
>>> KrbKdcReq send: #bytes read=562
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> KrbAsRep cons in KrbAsReq.getReply mquiroga/utria.uniandes.edu.co
Added server's keyKerberos Principal
mquiroga/utria.uniandes.edu.co at UNIANDES.EDU.COKey Version 0key
EncryptionKey: keyType=3 keyBytes (hex dump)=
0000: 19 94 76 64 26 83 CB 54
[Krb5LoginModule] added Krb5Principal
mquiroga/utria.uniandes.edu.co at UNIANDES.EDU.CO to Subject
Added server's keyKerberos Principal
mquiroga/utria.uniandes.edu.co at UNIANDES.EDU.COKey Version 0key
EncryptionKey: keyType=1 keyBytes (hex dump)=
0000: 19 94 76 64 26 83 CB 54
[Krb5LoginModule] added Krb5Principal
mquiroga/utria.uniandes.edu.co at UNIANDES.EDU.CO to Subject
Added server's keyKerberos Principal
mquiroga/utria.uniandes.edu.co at UNIANDES.EDU.COKey Version 0key
EncryptionKey: keyType=16 keyBytes (hex dump)=
0000: D0 E6 1A B5 D9 70 D6 8C 67 D6 3E 20 1C DF 32 C4 .....p..g.>
..2.
0010: 32 A2 C2 4C FE DF AE D6
[Krb5LoginModule] added Krb5Principal
mquiroga/utria.uniandes.edu.co at UNIANDES.EDU.CO to Subject
Commit Succeeded
Waiting for incoming connection...
Got connection from client /157.253.50.59
Will READ input token of size 518 for processing by acceptSecContext
Found key for mquiroga/utria.uniandes.edu.co at UNIANDES.EDU.CO(16)
Found key for mquiroga/utria.uniandes.edu.co at UNIANDES.EDU.CO(1)
Found key for mquiroga/utria.uniandes.edu.co at UNIANDES.EDU.CO(3)
Esto es una SecurityException No permission to acquire Kerberos accept
credential
java.lang.SecurityException: No permission to acquire Kerberos accept
credential
at sun.security.jgss.krb5.Krb5MechFactory.checkAcceptCredPermission(Krb5MechFactory.java:119)
at sun.security.jgss.krb5.Krb5MechFactory.getCredentialElement(Krb5MechFactory.java:79)
at sun.security.jgss.GSSManagerImpl.getCredentialElement(GSSManagerImpl.java:149)
at sun.security.jgss.GSSCredentialImpl.add(GSSCredentialImpl.java:389)
at sun.security.jgss.GSSCredentialImpl.<init>(GSSCredentialImpl.java:45)
at sun.security.jgss.GSSManagerImpl.createCredential(GSSManagerImpl.java:102)
at sun.security.jgss.GSSContextImpl.acceptSecContext(GSSContextImpl.java:277)
at sun.security.jgss.GSSContextImpl.acceptSecContext(GSSContextImpl.java:246)
at SampleServer.main(SampleServer.java:123)
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:39)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25)
at java.lang.reflect.Method.invoke(Method.java:585)
at MyAction.run(Login.java:225)
at java.security.AccessController.doPrivileged(Native Method)
at javax.security.auth.Subject.doAsPrivileged(Subject.java:517)
at Login.main(Login.java:187)
Esto es una SecurityException No permission to acquire Kerberos accept
credential
Will send token of size 518 from acceptSecContext.
Esto es PrivilegedActionException - INI
java.lang.reflect.InvocationTargetException
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:39)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25)
at java.lang.reflect.Method.invoke(Method.java:585)
at MyAction.run(Login.java:225)
at java.security.AccessController.doPrivileged(Native Method)
at javax.security.auth.Subject.doAsPrivileged(Subject.java:517)
at Login.main(Login.java:187)
Caused by: java.io.EOFException
at java.io.DataInputStream.readInt(DataInputStream.java:358)
at SampleServer.main(SampleServer.java:118)
... 8 more
Esto es PrivilegedActionException - FIN
CLIENT
Debug is true storeKey false useTicketCache false useKeyTab false
doNotPrompt false ticketCache is null KeyTab is null refreshKrb5Config
is false principal is alexmunoz/utria.uniandes.edu.co at UNIANDES.EDU.CO
tryFirstPass is false useFirstPass is false storePass is false
clearPass is false
Kerberos password for alexmunoz/utria.uniandes.edu.co at UNIANDES.EDU.CO:
al
[Krb5LoginModule] user entered username:
alexmunoz/utria.uniandes.edu.co at UNIANDES.EDU.CO
Using builtin default etypes for default_tkt_enctypes
default etypes for default_tkt_enctypes: 3 1 16.
principal is alexmunoz/utria.uniandes.edu.co at UNIANDES.EDU.CO
Acquire TGT using AS Exchange
EncryptionKey: keyType=3 keyBytes (hex dump)=0000: B9 86 13 75 13 2C
AB F1
EncryptionKey: keyType=1 keyBytes (hex dump)=0000: B9 86 13 75 13 2C
AB F1
EncryptionKey: keyType=16 keyBytes (hex dump)=0000: AD 58 02 92 1A 5E
B9 C2 BA 6D B0 64 0B 70 AE 1F .X...^...m.d.p..
0010: 6D 98 C8 16 68 A4 16 19
Using builtin default etypes for default_tkt_enctypes
default etypes for default_tkt_enctypes: 3 1 16.
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> KrbAsReq calling createMessage
>>> KrbAsReq in createMessage
>>> KrbKdcReq send: kdc=utria.uniandes.edu.co UDP:88, timeout=30000,
number of retries =3, #bytes=257
>>> KDCCommunication: kdc=utria.uniandes.edu.co UDP:88,
timeout=30000,Attempt =1, #bytes=257
>>> KrbKdcReq send: #bytes read=563
>>> KrbKdcReq send: #bytes read=563
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> KrbAsRep cons in KrbAsReq.getReply alexmunoz/utria.uniandes.edu.co
Commit Succeeded
Found ticket for alexmunoz/utria.uniandes.edu.co at UNIANDES.EDU.CO to go
to krbtgt/UNIANDES.EDU.CO at UNIANDES.EDU.CO expiring on Sun Nov 14
05:27:01 COT 2004
Entered Krb5Context.initSecContext with state=STATE_NEW
Found ticket for alexmunoz/utria.uniandes.edu.co at UNIANDES.EDU.CO to go
to krbtgt/UNIANDES.EDU.CO at UNIANDES.EDU.CO expiring on Sun Nov 14
05:27:01 COT 2004
Service ticket not found in the subject
>>> Credentials acquireServiceCreds: same realm
Using builtin default etypes for default_tgs_enctypes
default etypes for default_tgs_enctypes: 3 1 16.
>>> CksumType: sun.security.krb5.internal.crypto.RsaMd5CksumType
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> KrbKdcReq send: kdc=utria.uniandes.edu.co UDP:88, timeout=30000,
number of retries =3, #bytes=620
>>> KDCCommunication: kdc=utria.uniandes.edu.co UDP:88,
timeout=30000,Attempt =1, #bytes=620
>>> KrbKdcReq send: #bytes read=558
>>> KrbKdcReq send: #bytes read=558
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> KrbApReq: APOptions are 00100000 00000000 00000000 00000000
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Krb5Context setting mySeqNumber to: -2692
Created InitSecContextToken:
0000: 30 31 20 30 30 20 36 65 20 38 32 20 30 31 20 66 01 00 6e 82
01 f
0010: 31 20 33 30 20 38 32 20 30 31 20 65 64 20 61 30 1 30 82 01 ed
a0
0020: 20 30 33 20 30 32 20 30 31 20 30 35 20 61 31 20 03 02 01 05
a1
0030: 30 33 20 30 32 20 30 31 20 30 65 20 61 32 20 30 03 02 01 0e
a2 0
0040: 37 20 30 33 20 30 35 20 30 30 20 32 30 20 30 30 7 03 05 00 20
00
0050: 20 30 30 20 30 30 20 61 33 20 38 31 20 66 65 20 00 00 a3 81
fe
0060: 36 31 20 38 31 20 66 62 20 33 30 20 38 31 20 66 61 81 fb 30
81 f
0070: 38 20 61 30 20 30 33 20 30 32 20 30 31 20 30 35 8 a0 03 02 01
05
0080: 20 61 31 20 31 31 20 31 62 20 30 66 20 35 35 20 a1 11 1b 0f
55
0090: 34 65 20 34 39 20 34 31 20 34 65 20 34 34 20 34 4e 49 41 4e
44 4
00A0: 35 20 35 33 20 32 65 20 34 35 20 34 34 20 35 35 5 53 2e 45 44
55
00B0: 20 32 65 20 34 33 20 34 66 20 61 32 20 32 35 20 2e 43 4f a2
25
00C0: 33 30 20 32 33 20 61 30 20 30 33 20 30 32 20 30 30 23 a0 03
02 0
00D0: 31 20 30 30 20 61 31 20 31 63 20 33 30 20 31 61 1 00 a1 1c 30
1a
00E0: 20 31 62 20 30 37 20 36 62 20 37 32 20 36 32 20 1b 07 6b 72
62
00F0: 37 34 20 36 37 20 37 34 20 33 32 20 31 62 20 30 74 67 74 32
1b 0
0100: 66 20 35 35 20 34 65 20 34 39 20 34 31 20 34 65 f 55 4e 49 41
4e
0110: 20 34 34 20 34 35 20 35 33 20 32 65 20 34 35 20 44 45 53 2e
45
0120: 34 34 20 35 35 20 32 65 20 34 33 20 34 66 20 61 44 55 2e 43
4f a
0130: 33 20 38 31 20 62 36 20 33 30 20 38 31 20 62 33 3 81 b6 30 81
b3
0140: 20 61 30 20 30 33 20 30 32 20 30 31 20 30 31 20 a0 03 02 01
01
0150: 61 32 20 38 31 20 61 62 20 30 34 20 38 31 20 61 a2 81 ab 04
81 a
0160: 38 20 32 33 20 38 33 20 38 66 20 62 39 20 38 64 8 23 83 8f b9
8d
0170: 20 30 39 20 61 39 20 35 61 20 66 65 20 35 31 20 09 a9 5a fe
51
0180: 39 31 20 66 34 20 39 65 20 61 36 20 61 64 20 32 91 f4 9e a6
ad 2
0190: 36 20 36 37 20 32 66 20 36 31 20 35 66 20 63 30 6 67 2f 61 5f
c0
01A0: 20 66 37 20 32 34 20 34 32 20 66 30 20 33 39 20 f7 24 42 f0
39
01B0: 34 63 20 61 35 20 61 38 20 63 37 20 34 63 20 37 4c a5 a8 c7
4c 7
01C0: 38 20 36 65 20 34 30 20 33 32 20 61 35 20 34 35 8 6e 40 32 a5
45
01D0: 20 31 33 20 38 62 20 39 34 20 32 36 20 33 62 20 13 8b 94 26
3b
01E0: 31 63 20 66 61 20 62 37 20 33 37 20 39 63 20 37 1c fa b7 37
9c 7
01F0: 31 20 35 62 20 36 65 20 63 33 20 64 66 20 64 33 1 5b 6e c3 df
d3
0200: 20 62 33 20 37 36 20 63 39 20 33 38 20 61 33 20 b3 76 c9 38
a3
0210: 63 36 20 33 64 20 30 39 20 33 35 20 62 65 20 63 c6 3d 09 35
be c
0220: 61 20 30 31 20 66 35 20 62 39 20 31 34 20 33 39 a 01 f5 b9 14
39
0230: 20 32 30 20 66 34 20 66 37 20 62 61 20 66 64 20 20 f4 f7 ba
fd
0240: 37 61 20 61 30 20 61 65 20 36 62 20 62 39 20 35 7a a0 ae 6b
b9 5
0250: 36 20 30 34 20 37 31 20 31 66 20 64 32 20 65 34 6 04 71 1f d2
e4
0260: 20 34 33 20 62 63 20 35 38 20 39 66 20 63 32 20 43 bc 58 9f
c2
0270: 38 39 20 66 64 20 61 31 20 30 64 20 37 31 20 61 89 fd a1 0d
71 a
0280: 32 20 32 34 20 38 39 20 63 34 20 35 32 20 39 37 2 24 89 c4 52
97
0290: 20 34 38 20 39 30 20 34 66 20 65 33 20 34 39 20 48 90 4f e3
49
02A0: 35 39 20 30 30 20 63 38 20 35 62 20 39 37 20 39 59 00 c8 5b
97 9
02B0: 64 20 31 34 20 33 31 20 33 34 20 33 62 20 65 38 d 14 31 34 3b
e8
02C0: 20 30 36 20 35 66 20 64 62 20 34 62 20 35 35 20 06 5f db 4b
55
02D0: 30 34 20 33 31 20 30 61 20 32 61 20 34 35 20 32 04 31 0a 2a
45 2
02E0: 37 20 63 66 20 63 34 20 63 31 20 30 34 20 39 61 7 cf c4 c1 04
9a
02F0: 20 34 39 20 63 39 20 35 66 20 34 30 20 63 63 20 49 c9 5f 40
cc
0300: 31 35 20 32 37 20 35 61 20 38 37 20 66 37 20 63 15 27 5a 87
f7 c
0310: 65 20 30 63 20 34 38 20 62 31 20 38 33 20 33 34 e 0c 48 b1 83
34
0320: 20 61 35 20 35 30 20 30 37 20 33 34 20 33 30 20 a5 50 07 34
30
0330: 63 34 20 34 32 20 33 63 20 36 32 20 31 32 20 62 c4 42 3c 62
12 b
0340: 38 20 35 33 20 62 37 20 38 62 20 39 66 20 36 39 8 53 b7 8b 9f
69
0350: 20 35 66 20 64 36 20 37 32 20 61 34 20 38 31 20 5f d6 72 a4
81
0360: 64 36 20 33 30 20 38 31 20 64 33 20 61 30 20 30 d6 30 81 d3
a0 0
0370: 33 20 30 32 20 30 31 20 30 33 20 61 32 20 38 31 3 02 01 03 a2
81
0380: 20 63 62 20 30 34 20 38 31 20 63 38 20 63 36 20 cb 04 81 c8
c6
0390: 65 38 20 65 34 20 36 39 20 31 33 20 66 39 20 38 e8 e4 69 13
f9 8
03A0: 38 20 62 34 20 37 39 20 65 30 20 30 35 20 36 35 8 b4 79 e0 05
65
03B0: 20 64 37 20 64 34 20 61 37 20 37 34 20 38 63 20 d7 d4 a7 74
8c
03C0: 35 35 20 66 33 20 61 64 20 30 39 20 34 32 20 64 55 f3 ad 09
42 d
03D0: 34 20 64 64 20 35 65 20 66 35 20 34 34 20 63 64 4 dd 5e f5 44
cd
03E0: 20 61 65 20 35 33 20 38 65 20 66 36 20 35 65 20 ae 53 8e f6
5e
03F0: 34 32 20 35 39 20 63 31 20 33 37 20 35 34 20 30 42 59 c1 37
54 0
0400: 38 20 64 33 20 39 64 20 38 33 20 62 61 20 65 35 8 d3 9d 83 ba
e5
0410: 20 63 35 20 61 36 20 64 64 20 35 66 20 31 65 20 c5 a6 dd 5f
1e
0420: 38 36 20 64 30 20 31 31 20 33 38 20 31 39 20 38 86 d0 11 38
19 8
0430: 35 20 63 65 20 64 30 20 62 33 20 32 35 20 66 34 5 ce d0 b3 25
f4
0440: 20 63 36 20 38 62 20 62 37 20 34 63 20 35 39 20 c6 8b b7 4c
59
0450: 32 30 20 33 35 20 33 63 20 35 66 20 33 65 20 34 20 35 3c 5f
3e 4
0460: 66 20 63 39 20 30 36 20 33 66 20 38 61 20 33 37 f c9 06 3f 8a
37
0470: 20 62 35 20 39 33 20 62 65 20 36 61 20 66 33 20 b5 93 be 6a
f3
0480: 37 38 20 62 61 20 65 66 20 32 38 20 39 35 20 65 78 ba ef 28
95 e
0490: 36 20 38 64 20 64 34 20 66 64 20 61 62 20 33 37 6 8d d4 fd ab
37
04A0: 20 33 34 20 37 36 20 35 38 20 33 62 20 32 34 20 34 76 58 3b
24
04B0: 37 37 20 31 62 20 63 61 20 65 30 20 38 63 20 31 77 1b ca e0
8c 1
04C0: 37 20 65 65 20 64 38 20 66 34 20 63 31 20 38 65 7 ee d8 f4 c1
8e
04D0: 20 61 37 20 31 64 20 63 63 20 34 62 20 36 34 20 a7 1d cc 4b
64
04E0: 39 36 20 38 31 20 37 63 20 62 62 20 37 39 20 39 96 81 7c bb
79 9
04F0: 66 20 38 62 20 38 37 20 66 32 20 35 30 20 61 33 f 8b 87 f2 50
a3
0500: 20 61 63 20 36 39 20 39 39 20 64 62 20 64 34 20 ac 69 99 db
d4
0510: 33 62 20 31 36 20 65 32 20 61 33 20 33 61 20 38 3b 16 e2 a3
3a 8
0520: 61 20 30 39 20 66 33 20 30 64 20 62 34 20 65 30 a 09 f3 0d b4
e0
0530: 20 35 33 20 30 32 20 37 39 20 63 39 20 34 36 20 53 02 79 c9
46
0540: 63 64 20 30 30 20 35 37 20 63 34 20 36 30 20 66 cd 00 57 c4
60 f
0550: 35 20 61 62 20 35 34 20 63 36 20 62 62 20 32 37 5 ab 54 c6 bb
27
0560: 20 33 66 20 61 33 20 30 30 20 32 38 20 37 38 20 3f a3 00 28
78
0570: 34 35 20 61 39 20 37 65 20 62 64 20 36 65 20 63 45 a9 7e bd
6e c
0580: 61 20 38 66 20 38 66 20 37 62 20 64 30 20 33 34 a 8f 8f 7b d0
34
0590: 20 30 32 20 65 37 20 30 35 20 30 32 20 33 37 20 02 e7 05 02
37
05A0: 32 32 20 32 35 20 38 32 20 32 33 20 65 32 20 63 22 25 82 23
e2 c
05B0: 61 20 38 39 20 39 36 20 63 39 20 32 33 20 39 64 a 89 96 c9 23
9d
05C0: 20 32 38 20 32 39 20 64 66 20 34 34 20 30 31 20 28 29 df 44
01
05D0: 38 39 20 63 64 20 37 36 20 37 66 20 65 32 20 39 89 cd 76 7f
e2 9
05E0: 66 20 33 63 20
Context Established!
Client is alexmunoz/utria.uniandes.edu.co at UNIANDES.EDU.CO
Server is krbtgt2/UNIANDES.EDU.CO at UNIANDES.EDU.CO
Remaining lifetime in seconds = 2147483647
Context mechanism = 1.2.840.113554.1.2.2
Initiator = alexmunoz/utria.uniandes.edu.co at UNIANDES.EDU.CO
Acceptor = krbtgt2/UNIANDES.EDU.CO at UNIANDES.EDU.CO
Confidentiality (i.e., privacy) is available
Integrity is available
Mutual authentication took place!
QoP es: 0 org.ietf.jgss.MessageProp at 1b000e7
Krb5Context.wrap: data=[48 65 6c 6c 6f 20 54 68 65 72 65 21 00 ]
Esto es una GSSException de wrap Security context init/accept not yet
called or context deleted (Mechanism level: Wrap called in invalid
state!)
GSSException: Security context init/accept not yet called or context
deleted (Mechanism level: Wrap called in invalid state!)
at sun.security.jgss.krb5.Krb5Context.wrap(Krb5Context.java:785)
at sun.security.jgss.GSSContextImpl.wrap(GSSContextImpl.java:342)
at SampleClient.main(SampleClient.java:244)
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:39)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25)
at java.lang.reflect.Method.invoke(Method.java:585)
at MyAction.run(Login.java:225)
at java.security.AccessController.doPrivileged(Native Method)
at javax.security.auth.Subject.doAsPrivileged(Subject.java:517)
at Login.main(Login.java:187)
Esto es una GSSException de wrap Security context init/accept not yet
called or context deleted (Mechanism level: Wrap called in invalid
state!)
Will send wrap token of size 518
Will read token of size 518
Esto es una GSSException de la grande Security context init/accept not
yet called or context deleted (Mechanism level: verifyMIC called in
invalid state!)
GSSException: Security context init/accept not yet called or context
deleted (Mechanism level: verifyMIC called in invalid state!)
at sun.security.jgss.krb5.Krb5Context.verifyMIC(Krb5Context.java:1040)
at sun.security.jgss.GSSContextImpl.verifyMIC(GSSContextImpl.java:403)
at SampleClient.main(SampleClient.java:267)
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:39)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25)
at java.lang.reflect.Method.invoke(Method.java:585)
at MyAction.run(Login.java:225)
at java.security.AccessController.doPrivileged(Native Method)
at javax.security.auth.Subject.doAsPrivileged(Subject.java:517)
at Login.main(Login.java:187)
Esto es una GSSException de la grande Security context init/accept not
yet called or context deleted (Mechanism level: verifyMIC called in
invalid state!)
More information about the Kerberos
mailing list