principal: Invalid argument while creating "foo@FOO".
Jeff Blaine
jblaine at kickflop.net
Tue Dec 29 11:39:03 EST 2009
On 12/28/2009 10:17 PM, Tom Yu wrote:
> Jeff Blaine<jblaine at kickflop.net> writes:
>
>> On 12/28/2009 9:41 PM, Tom Yu wrote:
>>> Jeff Blaine<jblaine at kickflop.net> writes:
>>>
>>>> No, that works fine.
>>>
>>> When running kadmin remotely, does "addprinc" without "-randkey"
>>> succeed?
>>
>> Yup.
>
> This is probably a known bug, #6074. It was fixed in krb5-1.7, but
> not back-ported to 1.6.x. Basically, krb5-1.7 causes the RC4
> string-to-key to perform a proper UTF-8 conversion, and the "dummy"
> password that kadmin uses for performing the "addprinc -randkey"
> operation contains octet sequences that are not valid UTF-8. It's
> kind of an impedance mismatch between krb5-1.7 and earlier kadmin
> clients. Do you have RC4 ("arcfour-hmac-md5", etc.) configured in
> your "supported_enctypes" on that KDC?
I don't understand why I would need to specify that (?)
For example, this principal was created on the KDC box
via the same MIT 1.7 install tree that the KDC runs with:
Principal: krbtgt/FOO at FOO
...
Number of keys: 4
Key: vno 1, AES-256 CTS mode with 96-bit SHA-1 HMAC, no salt
Key: vno 1, AES-128 CTS mode with 96-bit SHA-1 HMAC, no salt
Key: vno 1, Triple DES cbc mode with HMAC/sha1, no salt
Key: vno 1, ArcFour with HMAC/md5, no salt <-----------
MKey: vno 1
...
More information about the Kerberos
mailing list