MIT + Heimdal + openssh == cross realm difficulties

Priit Randla priit.randla at eyp.ee
Mon Feb 7 03:31:26 EST 2005


Douglas E. Engert wrote:

> do you have a .k5login file in the home directory on srv1.bbb
> which has
> priitr at AAA
>
>
    Well, of cource I didn't. When I created it, I could log in using 
both telnet and openssh. Thank You,
I haven't used .rlogin-alikes a long time now...
But certainly there is another way to do that; I mean, as I have lots of 
workstations and
servers (~ 1000) to log on, there should be another way to maintain 
cross-realm trust, shouldn't it?
To create .k5login files for every account on every host doesn't seem 
like an elegant solution?
Hopefully I'm overlooking something trivial, could you please enlighten 
me? I really don't know...

Priit

> Priit Randla wrote:
>
>> Jeffrey Hutzelman wrote:
>>
>>>> "Client not found in database: priitr at AAA: No such entry in the 
>>>> database"
>>>>
>>>> Ask the Heimdal people, what does this message mean? 
>>>
>>>
>>>
>>    Well, I haven't got any answers from Heimdal list so far.
>>
>>>> With cross realm,
>>>> the server's realm should not require any knowlwdge of the user 
>>>> principal
>>>> and should not require it to be in its database.
>>>
>>>
>>>
>>>
>>> It means what it said - the client is not in that KDC's database.
>>> It does not mean that the KDC is refusing to issue a ticket.
>>
>>
>>
>>
>>    It's getting stranger (for me).  I dumped Heimdal for now and 
>> tried to get at least some form
>> of cross-realm trust going betveen  two MIT kdc's. No such luck.
>> I created same principals as in Heimdal case, tried ssh again:
>>
>> ssh -vvvvvvvvvvv srv1.bbb
>> debug2: Next authentication method: gssapi-with-mic
>> debug2: we sent a gssapi-with-mic packet, wait for reply
>> debug1: Delegating credentials
>> debug1: Delegating credentials
>> debug1: Authentications that can continue: 
>> publickey,gssapi-with-mic,gssapi,keyboard-interactive
>> debug2: we sent a gssapi-with-mic packet, wait for reply
>> debug1: Authentications that can continue: 
>> publickey,gssapi-with-mic,gssapi,keyboard-interactive
>> debug2: we did not send a packet, disable method
>> debug3: authmethod_lookup publickey
>> debug3: remaining preferred: keyboard-interactiva,password
>>
>> klist:
>> Ticket cache: FILE:/tmp/krb5cc_500
>> Default principal: priitr at AAA
>> Valid starting     Expires            Service principal
>> 02/04/05 18:03:21  02/05/05 08:03:21  krbtgt/AAA at AAA
>>        renew until 02/04/05 18:03:21
>> 02/04/05 18:05:06  02/05/05 08:03:21  krbtgt/BBB at AAA
>>        renew until 02/04/05 18:03:21
>> 02/04/05 18:05:06  02/05/05 08:03:21  host/srv1.infra3.ad4.seb.net at BBB
>>        renew until 02/04/05 18:03:21d-interactive,password
>>
>> On server side: sshd log
>>                                                   debug3: 
>> mm_request_receive entering
>> Feb  4 18:09:04 linux sshd[17922]: debug3: monitor_read: checking 
>> request 3
>> Feb  4 18:09:04 linux sshd[17922]: debug3: mm_answer_authserv: 
>> service=ssh-connection, style=
>> Feb  4 18:09:04 linux sshd[17922]: debug2: monitor_read: 3 used once, 
>> disabling now
>> Feb  4 18:09:04 linux sshd[17922]: debug3: mm_request_receive entering
>> Feb  4 18:09:04 linux sshd[17922]: debug3: monitor_read: checking 
>> request 37
>> Feb  4 18:09:04 linux sshd[17922]: debug3: mm_request_send entering: 
>> type 38
>> Feb  4 18:09:04 linux sshd[17922]: debug3: mm_request_receive entering
>> Feb  4 18:09:04 linux sshd[17922]: debug3: monitor_read: checking 
>> request 39
>> Feb  4 18:09:04 linux sshd[17922]: debug1: Received some client 
>> credentials
>> Feb  4 18:09:04 linux sshd[17922]: debug3: mm_request_send entering: 
>> type 40
>> Feb  4 18:09:04 linux sshd[17922]: debug3: mm_request_receive entering
>> Feb  4 18:09:04 linux sshd[17922]: debug3: monitor_read: checking 
>> request 43
>> Feb  4 18:09:04 linux sshd[17922]: debug3: mm_request_send entering: 
>> type 44
>> Feb  4 18:09:04 linux sshd[17922]: debug3: mm_request_receive entering
>> Feb  4 18:09:04 linux sshd[17922]: debug3: monitor_read: checking 
>> request 41
>> Feb  4 18:09:04 linux sshd[17922]: debug3: mm_answer_gss_userok: 
>> sending result 0
>> Feb  4 18:09:04 linux sshd[17922]: debug3: mm_request_send entering: 
>> type 42
>> Feb  4 18:09:04 linux sshd[17922]: Failed gssapi-with-mic for priitr 
>> from ::ffff:172.26.209.15 port 44702 ssh2
>> Feb  4 18:09:04 linux sshd[17922]: debug3: mm_request_receive entering
>> Feb  4 18:09:04 linux sshd[17922]: debug3: monitor_read: checking 
>> request 48
>> Feb  4 18:09:04 linux sshd[17922]: debug3: mm_answer_pam_init_ctx
>> Feb  4 18:09:04 linux sshd[17922]: debug3: PAM: sshpam_init_ctx entering
>> Feb  4 18:09:04 linux sshd[17922]: debug3: mm_request_send entering: 
>> type 49
>> Feb  4 18:09:04 linux sshd[17922]: debug3: mm_request_receive entering
>>
>> I also tried to test with kerberized telnet, still no luck:
>> client side:
>> telnet -F -a  -d srv1.bbb
>> Trying 172.26.209.10...
>> Connected to srv1.bbb (172.26.209.10).
>> Escape character is '^]'.
>> [ Kerberos V5 accepts you as ``priitr at AAA'' ]
>> [ Kerberos V5 accepted forwarded credentials ]
>> Password for priitr:
>>
>> server side:
>>  >>>TELNETD: I support auth type 2 6
>>  >>>TELNETD: I support auth type 2 2
>>  >>>TELNETD: I support auth type 2 0
>>  >>>TELNETD: I will support DES_CFB64
>>  >>>TELNETD: I will support DES_OFB64
>>  >>>TELNETD: Sending type 2 6
>>  >>>TELNETD: Sending type 2 2
>>  >>>TELNETD: Sending type 2 0
>>  >>>TELNETD: in auth_wait.
>>  >>>TELNETD: Got NAME [priitr]
>>  >>>REPLY:2: [3] (91) 6f 59 30 57 a0 03 02 01 05 a1 03 02 01 0f a2 4b
>>  >>>REPLY:2: [2] (13) 70 72 69 69 74 72 40 45 59 50 2e 45 45
>> telnetd: Kerberos5 identifies him as ``priitr at AAA''
>>  >>>TELNETD: He is supporting DES_CFB64 (1)
>>  >>>TELNETD: He is supporting DES_OFB64 (2)
>> Creating new feed
>>  >>>TELNETD: (*ep->start)() returned 6
>> CFB64: initial vector received
>> Initializing Decrypt stream
>> (*ep->is)(8060fc3, 9) returned MORE_TO_DO (7)
>>  >>>REPLY:2: [5] (0)
>> telnetd: Forwarded credentials obtained
>> (*ep->reply)(8060fc3, 1) returned MORE_TO_DO (4)
>>  >>>TELNETD: encrypt_reply returned 4
>>  >>>TELNETD: in encrypt_wait
>>
>> Priit
>> ________________________________________________
>> Kerberos mailing list           Kerberos at mit.edu
>> https://mailman.mit.edu/mailman/listinfo/kerberos
>>
>>
>>
>



More information about the Kerberos mailing list