Kerberos tickets, SSH public key auth, AFS tokens

Jeff Blaine jblaine at stage-infinity.com
Wed Dec 16 22:20:45 EST 2009


On 12/16/2009 8:33 PM, Russ Allbery wrote:
> Jeff Blaine<jblaine at stage-infinity.com>  writes:
>
>> sshd[20489]: [ID 237248 auth.debug] (pam_afs_session):
>> pam_sm_open_session: entry (0x0)
>> sshd[20489]: [ID 237248 auth.debug] (pam_afs_session): skipping tokens,
>> no Kerberos ticket cache
>
> Hm, are you sure that tickets are being forwarded?  In other words, after
> login, if you run klist, do you have a ticket cache?
>
> (It's expected that pam-krb5 will do nothing in the case of GSSAPI
> authentication.)
>

Yup, they're there, just no tokens.  I even tried a
pam_krb5RA2.so and pam_afs_session2.so built against
the Sun kerberos instead of our local MIT kerberos
for kicks.  Same result.

~:faron> kdestroy
~:faron> logout
Connection to faron closed.
~:cairo> /usr/bin/ssh -o "GSSAPIDelegateCredentials yes" faron
~:faron> klist
Ticket cache: FILE:/tmp/krb5cc_26560
Default principal: jblaine at RCF.FOO.ORG

Valid starting     Expires            Service principal
12/16/09 22:18:51  12/23/09 19:05:33  krbtgt/RCF.FOO.ORG at RCF.FOO.ORG
         renew until 12/23/09 19:05:33


Kerberos 4 ticket cache: /tmp/tkt26560
klist: You have no tickets cached
~:faron>




More information about the Kerberos mailing list