A problem with GSS-API (kdc = SEAM by SUN): GSSExceptionFailure decryptedlevel: AP_REP token id does not ma
Seema Malkani
Seema.Malkani at Sun.COM
Fri Nov 26 16:52:18 EST 2004
Typically the error "Integrity check on decrypted field failed" is seen
when an incorrect key is used. Due to incorrect set-up, different keys
are being used for encryption and decryption.
This is not an issue with Java GSS in J2SE 1.5. Please check your
Kerberos configuration and Kerberos principals set-up for client and
server. In addition, make sure the keys in the keytab are correct. Send
me the details of your set-up.
I have already corresponded with Alex earlier, when this issue was
posted to the Sun alias (java-security at sun.com). Please let me know if
you have any questions.
Seema
Andreas Schmid wrote:
>Hi!
>
>All this GSS-API stuff does not work in Java 1.5.
>It seems to be a big bug.
>
>In Java 1.4 all works fine!
>
>
>alexmunoz at uniandes.edu.co (Don Alex) wrote in message news:<55ce270.0411141412.179b355f at posting.google.com>...
>
>
>>Hi doc!!!!:
>>
>>I am running the Sample with tutorial "Use of JAAS Login Utility and
>>Java GSS-API for Secure Messages without JAAS programming"
>>KDC is a SEAM in Solaris 9
>>JDK 1.5
>>The Code are SampleClient.java y SampleServer.java without relevant
>>modifications
>>
>>If anyone has any ideas I'm all ears.
>>
>>Don Alex
>>
>>
>>SERVER:
>>Waiting for incoming connection...
>>Got connection from client /157.253.50.59
>>Will read input token of size 517 for processing by acceptSecContext
>>Debug is true storeKey true useTicketCache false useKeyTab false
>>doNotPrompt false ticketCache is null KeyTab is null refreshKrb5Config
>>is false principal is null tryFirstPass is false useFirstPass is false
>>storePass is false clearPass is false
>>Kerberos username [root]: alexmunoz/utria.uniandes.edu.co
>>Kerberos password for alexmunoz/utria.uniandes.edu.co: al
>> [Krb5LoginModule] user entered username:
>>alexmunoz/utria.uniandes.edu.co
>>
>>Using builtin default etypes for default_tkt_enctypes
>>default etypes for default_tkt_enctypes: 3 1 16.
>>principal is alexmunoz/utria.uniandes.edu.co at UNIANDES.EDU.CO
>>Acquire TGT using AS Exchange
>>EncryptionKey: keyType=3 keyBytes (hex dump)=0000: B9 86 13 75 13 2C
>>AB F1
>>EncryptionKey: keyType=1 keyBytes (hex dump)=0000: B9 86 13 75 13 2C
>>AB F1
>>EncryptionKey: keyType=16 keyBytes (hex dump)=0000: AD 58 02 92 1A 5E
>>B9 C2 BA 6D B0 64 0B 70 AE 1F .X...^...m.d.p..
>>0010: 6D 98 C8 16 68 A4 16 19
>>Using builtin default etypes for default_tkt_enctypes
>>default etypes for default_tkt_enctypes: 3 1 16.
>>
>>
>>>>>EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>>>>KrbAsReq calling createMessage
>>>>>KrbAsReq in createMessage
>>>>>KrbKdcReq send: kdc=utria.uniandes.edu.co UDP:88, timeout=30000,
>>>>>
>>>>>
>> number of retries =3, #bytes=257
>>
>>
>>>>>KDCCommunication: kdc=utria.uniandes.edu.co UDP:88,
>>>>>
>>>>>
>> timeout=30000,Attempt =1, #bytes=257
>>
>>
>>>>>KrbKdcReq send: #bytes read=563
>>>>>KrbKdcReq send: #bytes read=563
>>>>>EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>>>>KrbAsRep cons in KrbAsReq.getReply alexmunoz/utria.uniandes.edu.co
>>>>>
>>>>>
>>Added server's keyKerberos Principal
>>alexmunoz/utria.uniandes.edu.co at UNIANDES.EDU.COKey Version 0key
>>EncryptionKey: keyType=3 keyBytes (hex dump)=
>>0000: B9 86 13 75 13 2C AB F1
>>
>> [Krb5LoginModule] added Krb5Principal
>>alexmunoz/utria.uniandes.edu.co at UNIANDES.EDU.CO to Subject
>>Added server's keyKerberos Principal
>>alexmunoz/utria.uniandes.edu.co at UNIANDES.EDU.COKey Version 0key
>>EncryptionKey: keyType=1 keyBytes (hex dump)=
>>0000: B9 86 13 75 13 2C AB F1
>>
>> [Krb5LoginModule] added Krb5Principal
>>alexmunoz/utria.uniandes.edu.co at UNIANDES.EDU.CO to Subject
>>Added server's keyKerberos Principal
>>alexmunoz/utria.uniandes.edu.co at UNIANDES.EDU.COKey Version 0key
>>EncryptionKey: keyType=16 keyBytes (hex dump)=
>>0000: AD 58 02 92 1A 5E B9 C2 BA 6D B0 64 0B 70 AE 1F
>>.X...^...m.d.p..
>>0010: 6D 98 C8 16 68 A4 16 19
>>
>> [Krb5LoginModule] added Krb5Principal
>>alexmunoz/utria.uniandes.edu.co at UNIANDES.EDU.CO to Subject
>>Commit Succeeded
>>
>>Found key for alexmunoz/utria.uniandes.edu.co at UNIANDES.EDU.CO(3)
>>Found key for alexmunoz/utria.uniandes.edu.co at UNIANDES.EDU.CO(16)
>>Found key for alexmunoz/utria.uniandes.edu.co at UNIANDES.EDU.CO(1)
>>Entered Krb5Context.acceptSecContext with state=STATE_NEW
>>
>>
>>>>>EType: sun.security.krb5.internal.crypto.DesCbcCrcEType
>>>>>crc32: b2075a55
>>>>>crc32: 10110010000001110101101001010101
>>>>>
>>>>>
>>GSSException Failure unspecified at GSS-API level (Mechanism level:
>>Integrity check on decrypted field failed (31))
>>GSSException: Failure unspecified at GSS-API level (Mechanism level:
>>Integrity check on decrypted field failed (31))
>> at sun.security.jgss.krb5.Krb5Context.acceptSecContext(Krb5Context.java:730)
>> at sun.security.jgss.GSSContextImpl.acceptSecContext(GSSContextImpl.java:300)
>> at sun.security.jgss.GSSContextImpl.acceptSecContext(GSSContextImpl.java:246)
>> at SampleServer.main(SampleServer.java:117)
>>Caused by: KrbException: Integrity check on decrypted field failed
>>(31)
>> at sun.security.krb5.internal.crypto.t.b(DashoA12275:154)
>> at sun.security.krb5.internal.crypto.s.b(DashoA12275:77)
>> at sun.security.krb5.EncryptedData.decrypt(DashoA12275:157)
>> at sun.security.krb5.KrbApReq.a(DashoA12275:266)
>> at sun.security.krb5.KrbApReq.<init>(DashoA12275:134)
>> at sun.security.jgss.krb5.InitSecContextToken.<init>(InitSecContextToken.java:79)
>> at sun.security.jgss.krb5.Krb5Context.acceptSecContext(Krb5Context.java:715)
>> ... 3 more
>>GSSException Failure unspecified at GSS-API level (Mechanism level:
>>Integrity check on decrypted field failed (31))
>>Will send token of size 517 from acceptSecContext.
>>Exception in thread "main" java.io.EOFException
>> at java.io.DataInputStream.readInt(DataInputStream.java:358)
>> at SampleServer.main(SampleServer.java:111)
>>
>>
>>
>>
>>CLIENT:
>>Connected to server utria.uniandes.edu.co/157.253.50.59
>>Debug is true storeKey false useTicketCache false useKeyTab false
>>doNotPrompt false ticketCache is null KeyTab is null refreshKrb5Config
>>is false principal is null tryFirstPass is false useFirstPass is false
>>storePass is false clearPass is false
>>Kerberos username [root]: alexmunoz/utria.uniandes.edu.co
>>Kerberos password for alexmunoz/utria.uniandes.edu.co: al
>> [Krb5LoginModule] user entered username:
>>alexmunoz/utria.uniandes.edu.co
>>
>>Using builtin default etypes for default_tkt_enctypes
>>default etypes for default_tkt_enctypes: 3 1 16.
>>principal is alexmunoz/utria.uniandes.edu.co at UNIANDES.EDU.CO
>>Acquire TGT using AS Exchange
>>EncryptionKey: keyType=3 keyBytes (hex dump)=0000: B9 86 13 75 13 2C
>>AB F1
>>EncryptionKey: keyType=1 keyBytes (hex dump)=0000: B9 86 13 75 13 2C
>>AB F1
>>EncryptionKey: keyType=16 keyBytes (hex dump)=0000: AD 58 02 92 1A 5E
>>B9 C2 BA 6D B0 64 0B 70 AE 1F .X...^...m.d.p..
>>0010: 6D 98 C8 16 68 A4 16 19
>>Using builtin default etypes for default_tkt_enctypes
>>default etypes for default_tkt_enctypes: 3 1 16.
>>
>>
>>>>>EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>>>>KrbAsReq calling createMessage
>>>>>KrbAsReq in createMessage
>>>>>KrbKdcReq send: kdc=utria.uniandes.edu.co UDP:88, timeout=30000,
>>>>>
>>>>>
>> number of retries =3, #bytes=257
>>
>>
>>>>>KDCCommunication: kdc=utria.uniandes.edu.co UDP:88,
>>>>>
>>>>>
>> timeout=30000,Attempt =1, #bytes=257
>>
>>
>>>>>KrbKdcReq send: #bytes read=563
>>>>>KrbKdcReq send: #bytes read=563
>>>>>EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>>>>KrbAsRep cons in KrbAsReq.getReply alexmunoz/utria.uniandes.edu.co
>>>>>
>>>>>
>>Commit Succeeded
>>
>>Found ticket for alexmunoz/utria.uniandes.edu.co at UNIANDES.EDU.CO to go
>>to krbtgt/UNIANDES.EDU.CO at UNIANDES.EDU.CO expiring on Sun Nov 14
>>22:00:17 COT 2004
>>Entered Krb5Context.initSecContext with state=STATE_NEW
>>Service ticket not found in the subject
>>
>>
>>>>>Credentials acquireServiceCreds: same realm
>>>>>
>>>>>
>>Using builtin default etypes for default_tgs_enctypes
>>default etypes for default_tgs_enctypes: 3 1 16.
>>
>>
>>>>>CksumType: sun.security.krb5.internal.crypto.RsaMd5CksumType
>>>>>EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>>>>KrbKdcReq send: kdc=utria.uniandes.edu.co UDP:88, timeout=30000,
>>>>>
>>>>>
>> number of retries =3, #bytes=619
>>
>>
>>>>>KDCCommunication: kdc=utria.uniandes.edu.co UDP:88,
>>>>>
>>>>>
>> timeout=30000,Attempt =1, #bytes=619
>>
>>
>>>>>KrbKdcReq send: #bytes read=557
>>>>>KrbKdcReq send: #bytes read=557
>>>>>EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>>>>KrbApReq: APOptions are 00100000 00000000 00000000 00000000
>>>>>EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>>>>
>>>>>
>>Krb5Context setting mySeqNumber to: -1456
>>Created InitSecContextToken:
>>0000: 30 31 20 30 30 20 36 65 20 38 32 20 30 31 20 66 01 00 6e 82
>>01 f
>>0010: 30 20 33 30 20 38 32 20 30 31 20 65 63 20 61 30 0 30 82 01 ec
>>a0
>>0020: 20 30 33 20 30 32 20 30 31 20 30 35 20 61 31 20 03 02 01 05
>>a1
>>0030: 30 33 20 30 32 20 30 31 20 30 65 20 61 32 20 30 03 02 01 0e
>>a2 0
>>0040: 37 20 30 33 20 30 35 20 30 30 20 32 30 20 30 30 7 03 05 00 20
>>00
>>0050: 20 30 30 20 30 30 20 61 33 20 38 31 20 66 64 20 00 00 a3 81
>>fd
>>0060: 36 31 20 38 31 20 66 61 20 33 30 20 38 31 20 66 61 81 fa 30
>>81 f
>>0070: 37 20 61 30 20 30 33 20 30 32 20 30 31 20 30 35 7 a0 03 02 01
>>05
>>0080: 20 61 31 20 31 31 20 31 62 20 30 66 20 35 35 20 a1 11 1b 0f
>>55
>>0090: 34 65 20 34 39 20 34 31 20 34 65 20 34 34 20 34 4e 49 41 4e
>>44 4
>>00A0: 35 20 35 33 20 32 65 20 34 35 20 34 34 20 35 35 5 53 2e 45 44
>>55
>>00B0: 20 32 65 20 34 33 20 34 66 20 61 32 20 32 34 20 2e 43 4f a2
>>24
>>00C0: 33 30 20 32 32 20 61 30 20 30 33 20 30 32 20 30 30 22 a0 03
>>02 0
>>00D0: 31 20 30 30 20 61 31 20 31 62 20 33 30 20 31 39 1 00 a1 1b 30
>>19
>>00E0: 20 31 62 20 30 36 20 36 62 20 37 32 20 36 32 20 1b 06 6b 72
>>62
>>00F0: 37 34 20 36 37 20 37 34 20 31 62 20 30 66 20 35 74 67 74 1b
>>0f 5
>>0100: 35 20 34 65 20 34 39 20 34 31 20 34 65 20 34 34 5 4e 49 41 4e
>>44
>>0110: 20 34 35 20 35 33 20 32 65 20 34 35 20 34 34 20 45 53 2e 45
>>44
>>0120: 35 35 20 32 65 20 34 33 20 34 66 20 61 33 20 38 55 2e 43 4f
>>a3 8
>>0130: 31 20 62 36 20 33 30 20 38 31 20 62 33 20 61 30 1 b6 30 81 b3
>>a0
>>0140: 20 30 33 20 30 32 20 30 31 20 30 31 20 61 32 20 03 02 01 01
>>a2
>>0150: 38 31 20 61 62 20 30 34 20 38 31 20 61 38 20 30 81 ab 04 81
>>a8 0
>>0160: 31 20 35 34 20 39 38 20 34 37 20 61 35 20 32 32 1 54 98 47 a5
>>22
>>0170: 20 66 66 20 38 33 20 39 31 20 35 36 20 65 37 20 ff 83 91 56
>>e7
>>0180: 39 64 20 30 65 20 61 65 20 63 62 20 62 61 20 38 9d 0e ae cb
>>ba 8
>>0190: 34 20 32 39 20 33 65 20 32 33 20 32 66 20 61 36 4 29 3e 23 2f
>>a6
>>01A0: 20 34 63 20 63 31 20 31 34 20 36 63 20 64 64 20 4c c1 14 6c
>>dd
>>01B0: 36 38 20 31 30 20 66 33 20 61 38 20 62 32 20 66 68 10 f3 a8
>>b2 f
>>01C0: 61 20 32 30 20 62 33 20 38 63 20 34 38 20 32 37 a 20 b3 8c 48
>>27
>>01D0: 20 31 66 20 39 39 20 33 33 20 35 65 20 31 36 20 1f 99 33 5e
>>16
>>01E0: 38 64 20 33 31 20 35 32 20 66 39 20 32 65 20 64 8d 31 52 f9
>>2e d
>>01F0: 32 20 38 35 20 30 37 20 63 64 20 64 64 20 31 64 2 85 07 cd dd
>>1d
>>0200: 20 62 64 20 37 34 20 37 62 20 30 65 20 36 62 20 bd 74 7b 0e
>>6b
>>0210: 36 39 20 33 64 20 30 65 20 35 31 20 34 31 20 64 69 3d 0e 51
>>41 d
>>0220: 66 20 62 36 20 30 35 20 66 65 20 62 37 20 37 61 f b6 05 fe b7
>>7a
>>0230: 20 62 38 20 61 32 20 61 31 20 31 65 20 65 39 20 b8 a2 a1 1e
>>e9
>>0240: 64 62 20 62 39 20 36 62 20 31 34 20 30 62 20 34 db b9 6b 14
>>0b 4
>>0250: 63 20 31 63 20 64 64 20 62 31 20 65 30 20 32 66 c 1c dd b1 e0
>>2f
>>0260: 20 62 30 20 34 36 20 39 63 20 35 35 20 30 65 20 b0 46 9c 55
>>0e
>>0270: 33 64 20 66 61 20 38 65 20 66 37 20 33 64 20 35 3d fa 8e f7
>>3d 5
>>0280: 63 20 30 65 20 66 39 20 36 36 20 64 36 20 62 63 c 0e f9 66 d6
>>bc
>>0290: 20 62 31 20 61 32 20 66 36 20 34 35 20 62 35 20 b1 a2 f6 45
>>b5
>>02A0: 39 32 20 62 62 20 65 35 20 62 31 20 63 33 20 32 92 bb e5 b1
>>c3 2
>>02B0: 65 20 64 61 20 61 62 20 65 38 20 63 35 20 31 39 e da ab e8 c5
>>19
>>02C0: 20 39 62 20 36 37 20 38 63 20 30 64 20 37 33 20 9b 67 8c 0d
>>73
>>02D0: 30 61 20 65 65 20 36 63 20 65 33 20 39 35 20 64 0a ee 6c e3
>>95 d
>>02E0: 39 20 64 32 20 34 61 20 32 66 20 38 64 20 39 65 9 d2 4a 2f 8d
>>9e
>>02F0: 20 35 35 20 38 30 20 37 33 20 32 32 20 34 61 20 55 80 73 22
>>4a
>>0300: 66 61 20 61 30 20 63 39 20 39 66 20 37 65 20 33 fa a0 c9 9f
>>7e 3
>>0310: 32 20 63 63 20 30 62 20 62 37 20 66 34 20 63 66 2 cc 0b b7 f4
>>cf
>>0320: 20 36 65 20 61 30 20 32 31 20 65 35 20 32 64 20 6e a0 21 e5
>>2d
>>0330: 32 64 20 66 62 20 34 62 20 66 34 20 39 37 20 36 2d fb 4b f4
>>97 6
>>0340: 66 20 64 66 20 35 33 20 61 35 20 36 31 20 36 33 f df 53 a5 61
>>63
>>0350: 20 61 34 20 32 31 20 61 34 20 38 31 20 64 36 20 a4 21 a4 81
>>d6
>>0360: 33 30 20 38 31 20 64 33 20 61 30 20 30 33 20 30 30 81 d3 a0
>>03 0
>>0370: 32 20 30 31 20 30 33 20 61 32 20 38 31 20 63 62 2 01 03 a2 81
>>cb
>>0380: 20 30 34 20 38 31 20 63 38 20 66 35 20 34 61 20 04 81 c8 f5
>>4a
>>0390: 39 34 20 66 37 20 64 66 20 32 35 20 31 65 20 62 94 f7 df 25
>>1e b
>>03A0: 36 20 38 32 20 38 35 20 63 36 20 37 31 20 33 30 6 82 85 c6 71
>>30
>>03B0: 20 61 62 20 64 62 20 64 66 20 38 65 20 36 38 20 ab db df 8e
>>68
>>03C0: 62 31 20 33 35 20 34 65 20 30 34 20 35 61 20 30 b1 35 4e 04
>>5a 0
>>03D0: 35 20 32 62 20 31 36 20 65 61 20 38 65 20 35 35 5 2b 16 ea 8e
>>55
>>03E0: 20 37 63 20 34 63 20 66 37 20 31 62 20 34 64 20 7c 4c f7 1b
>>4d
>>03F0: 65 33 20 63 63 20 37 33 20 64 38 20 37 38 20 64 e3 cc 73 d8
>>78 d
>>0400: 63 20 64 31 20 36 66 20 38 63 20 34 39 20 30 35 c d1 6f 8c 49
>>05
>>0410: 20 34 33 20 36 61 20 35 35 20 66 37 20 64 65 20 43 6a 55 f7
>>de
>>0420: 38 64 20 63 65 20 31 33 20 35 37 20 66 38 20 33 8d ce 13 57
>>f8 3
>>0430: 31 20 31 35 20 36 62 20 64 31 20 31 61 20 36 39 1 15 6b d1 1a
>>69
>>0440: 20 63 33 20 30 33 20 30 30 20 32 66 20 34 35 20 c3 03 00 2f
>>45
>>0450: 36 33 20 62 63 20 63 30 20 30 62 20 39 36 20 33 63 bc c0 0b
>>96 3
>>0460: 66 20 33 36 20 36 39 20 36 65 20 63 39 20 38 64 f 36 69 6e c9
>>8d
>>0470: 20 39 37 20 61 63 20 38 34 20 62 30 20 39 30 20 97 ac 84 b0
>>90
>>0480: 37 30 20 36 63 20 32 38 20 30 62 20 35 30 20 65 70 6c 28 0b
>>50 e
>>0490: 33 20 65 61 20 62 38 20 61 31 20 35 34 20 62 63 3 ea b8 a1 54
>>bc
>>04A0: 20 39 37 20 34 39 20 66 65 20 31 37 20 30 39 20 97 49 fe 17
>>09
>>04B0: 62 39 20 64 35 20 39 31 20 63 36 20 35 36 20 38 b9 d5 91 c6
>>56 8
>>04C0: 39 20 34 33 20 61 66 20 38 36 20 31 35 20 65 66 9 43 af 86 15
>>ef
>>04D0: 20 65 66 20 64 37 20 63 66 20 64 62 20 37 33 20 ef d7 cf db
>>73
>>04E0: 38 65 20 64 39 20 65 63 20 33 31 20 65 34 20 31 8e d9 ec 31
>>e4 1
>>04F0: 63 20 34 64 20 61 62 20 61 34 20 63 39 20 61 63 c 4d ab a4 c9
>>ac
>>0500: 20 65 66 20 32 62 20 30 30 20 31 66 20 38 63 20 ef 2b 00 1f
>>8c
>>0510: 31 31 20 64 36 20 39 30 20 64 36 20 66 64 20 38 11 d6 90 d6
>>fd 8
>>0520: 63 20 61 36 20 30 66 20 30 61 20 39 66 20 62 61 c a6 0f 0a 9f
>>ba
>>0530: 20 34 39 20 31 65 20 35 63 20 63 36 20 65 34 20 49 1e 5c c6
>>e4
>>0540: 36 34 20 61 61 20 63 33 20 64 66 20 32 63 20 32 64 aa c3 df
>>2c 2
>>0550: 32 20 63 34 20 30 66 20 39 30 20 64 36 20 63 62 2 c4 0f 90 d6
>>cb
>>0560: 20 35 39 20 39 31 20 63 39 20 39 39 20 36 38 20 59 91 c9 99
>>68
>>0570: 37 38 20 63 65 20 31 37 20 35 31 20 31 61 20 62 78 ce 17 51
>>1a b
>>0580: 37 20 63 30 20 66 63 20 63 33 20 36 30 20 39 30 7 c0 fc c3 60
>>90
>>0590: 20 31 39 20 61 31 20 30 62 20 35 61 20 38 31 20 19 a1 0b 5a
>>81
>>05A0: 61 34 20 31 30 20 64 37 20 34 64 20 36 39 20 61 a4 10 d7 4d
>>69 a
>>05B0: 65 20 36 61 20 63 37 20 63 35 20 66 63 20 63 39 e 6a c7 c5 fc
>>c9
>>05C0: 20 63 34 20 61 39 20 37 33 20 30 66 20 37 63 20 c4 a9 73 0f
>>7c
>>05D0: 36 32 20 62 39 20 37 61 20 65 38 20 39 39 20 36 62 b9 7a e8
>>99 6
>>05E0: 30 20
>>Will send token of size 517 from initSecContext.
>>Will read input token of size 517 for processing by initSecContext
>>Entered Krb5Context.initSecContext with state=STATE_IN_PROCESS
>>Exception in thread "main" GSSException: Defective token detected
>>(Mechanism level: AP_REP token id does not match!)
>> at sun.security.jgss.krb5.AcceptSecContextToken.<init>(AcceptSecContextToken.java:65)
>> at sun.security.jgss.krb5.Krb5Context.initSecContext(Krb5Context.java:640)
>> at sun.security.jgss.GSSContextImpl.initSecContext(GSSContextImpl.java:213)
>> at sun.security.jgss.GSSContextImpl.initSecContext(GSSContextImpl.java:158)
>> at SampleClient.main(SampleClient.java:144)
>>
>>
>________________________________________________
>Kerberos mailing list Kerberos at mit.edu
>https://mailman.mit.edu/mailman/listinfo/kerberos
>
>
More information about the Kerberos
mailing list