MIT + Heimdal + openssh == cross realm difficulties

Priit Randla priit.randla at eyp.ee
Fri Feb 4 11:14:42 EST 2005


Jeffrey Hutzelman wrote:

>> "Client not found in database: priitr at AAA: No such entry in the 
>> database"
>>
>> Ask the Heimdal people, what does this message mean? 
>
    Well, I haven't got any answers from Heimdal list so far.

>> With cross realm,
>> the server's realm should not require any knowlwdge of the user 
>> principal
>> and should not require it to be in its database.
>
>
> It means what it said - the client is not in that KDC's database.
> It does not mean that the KDC is refusing to issue a ticket.


    It's getting stranger (for me).  I dumped Heimdal for now and tried 
to get at least some form
of cross-realm trust going betveen  two MIT kdc's. No such luck.
I created same principals as in Heimdal case, tried ssh again:

ssh -vvvvvvvvvvv srv1.bbb
debug2: Next authentication method: gssapi-with-mic
debug2: we sent a gssapi-with-mic packet, wait for reply
debug1: Delegating credentials
debug1: Delegating credentials
debug1: Authentications that can continue: 
publickey,gssapi-with-mic,gssapi,keyboard-interactive
debug2: we sent a gssapi-with-mic packet, wait for reply
debug1: Authentications that can continue: 
publickey,gssapi-with-mic,gssapi,keyboard-interactive
debug2: we did not send a packet, disable method
debug3: authmethod_lookup publickey
debug3: remaining preferred: keyboard-interactiva,password

klist:
Ticket cache: FILE:/tmp/krb5cc_500
Default principal: priitr at AAA
Valid starting     Expires            Service principal
02/04/05 18:03:21  02/05/05 08:03:21  krbtgt/AAA at AAA
        renew until 02/04/05 18:03:21
02/04/05 18:05:06  02/05/05 08:03:21  krbtgt/BBB at AAA
        renew until 02/04/05 18:03:21
02/04/05 18:05:06  02/05/05 08:03:21  host/srv1.infra3.ad4.seb.net at BBB
        renew until 02/04/05 18:03:21d-interactive,password

On server side: sshd log
                                                   debug3: 
mm_request_receive entering
Feb  4 18:09:04 linux sshd[17922]: debug3: monitor_read: checking request 3
Feb  4 18:09:04 linux sshd[17922]: debug3: mm_answer_authserv: 
service=ssh-connection, style=
Feb  4 18:09:04 linux sshd[17922]: debug2: monitor_read: 3 used once, 
disabling now
Feb  4 18:09:04 linux sshd[17922]: debug3: mm_request_receive entering
Feb  4 18:09:04 linux sshd[17922]: debug3: monitor_read: checking request 37
Feb  4 18:09:04 linux sshd[17922]: debug3: mm_request_send entering: type 38
Feb  4 18:09:04 linux sshd[17922]: debug3: mm_request_receive entering
Feb  4 18:09:04 linux sshd[17922]: debug3: monitor_read: checking request 39
Feb  4 18:09:04 linux sshd[17922]: debug1: Received some client credentials
Feb  4 18:09:04 linux sshd[17922]: debug3: mm_request_send entering: type 40
Feb  4 18:09:04 linux sshd[17922]: debug3: mm_request_receive entering
Feb  4 18:09:04 linux sshd[17922]: debug3: monitor_read: checking request 43
Feb  4 18:09:04 linux sshd[17922]: debug3: mm_request_send entering: type 44
Feb  4 18:09:04 linux sshd[17922]: debug3: mm_request_receive entering
Feb  4 18:09:04 linux sshd[17922]: debug3: monitor_read: checking request 41
Feb  4 18:09:04 linux sshd[17922]: debug3: mm_answer_gss_userok: sending 
result 0
Feb  4 18:09:04 linux sshd[17922]: debug3: mm_request_send entering: type 42
Feb  4 18:09:04 linux sshd[17922]: Failed gssapi-with-mic for priitr 
from ::ffff:172.26.209.15 port 44702 ssh2
Feb  4 18:09:04 linux sshd[17922]: debug3: mm_request_receive entering
Feb  4 18:09:04 linux sshd[17922]: debug3: monitor_read: checking request 48
Feb  4 18:09:04 linux sshd[17922]: debug3: mm_answer_pam_init_ctx
Feb  4 18:09:04 linux sshd[17922]: debug3: PAM: sshpam_init_ctx entering
Feb  4 18:09:04 linux sshd[17922]: debug3: mm_request_send entering: type 49
Feb  4 18:09:04 linux sshd[17922]: debug3: mm_request_receive entering

I also tried to test with kerberized telnet, still no luck:
client side:
telnet -F -a  -d srv1.bbb
Trying 172.26.209.10...
Connected to srv1.bbb (172.26.209.10).
Escape character is '^]'.
[ Kerberos V5 accepts you as ``priitr at AAA'' ]
[ Kerberos V5 accepted forwarded credentials ]
Password for priitr:

server side:
 >>>TELNETD: I support auth type 2 6
 >>>TELNETD: I support auth type 2 2
 >>>TELNETD: I support auth type 2 0
 >>>TELNETD: I will support DES_CFB64
 >>>TELNETD: I will support DES_OFB64
 >>>TELNETD: Sending type 2 6
 >>>TELNETD: Sending type 2 2
 >>>TELNETD: Sending type 2 0
 >>>TELNETD: in auth_wait.
 >>>TELNETD: Got NAME [priitr]
 >>>REPLY:2: [3] (91) 6f 59 30 57 a0 03 02 01 05 a1 03 02 01 0f a2 4b
 >>>REPLY:2: [2] (13) 70 72 69 69 74 72 40 45 59 50 2e 45 45
telnetd: Kerberos5 identifies him as ``priitr at AAA''
 >>>TELNETD: He is supporting DES_CFB64 (1)
 >>>TELNETD: He is supporting DES_OFB64 (2)
Creating new feed
 >>>TELNETD: (*ep->start)() returned 6
CFB64: initial vector received
Initializing Decrypt stream
(*ep->is)(8060fc3, 9) returned MORE_TO_DO (7)
 >>>REPLY:2: [5] (0)
telnetd: Forwarded credentials obtained
(*ep->reply)(8060fc3, 1) returned MORE_TO_DO (4)
 >>>TELNETD: encrypt_reply returned 4
 >>>TELNETD: in encrypt_wait

Priit


More information about the Kerberos mailing list