[EXTERNAL] Re: Issue with Kerberos setting in Sun Solaris 10
Ray Vand
ray_vand at filemaker.com
Mon Apr 22 17:46:06 EDT 2013
Christopher,
Yes, I have. Please see below.
# cat krb5.conf
libdefaults]
default_realm = COMPANY.COM
default_keytab_name = /etc/krb5/krb5.keytab
default_tkt_enctypes = arcfour-hmac-md5 des-cbc-crc des-cbc-md5
default_tgs_enctypes = arcfour-hmac-md5 des-cbc-crc des-cbc-md5
allow_weak_crypto = true
[realms]
COMPANY.COM = {
kdc = ads.company.com:88
admin_server = ads.company.com
default.domain = COMPANY.COM
kpasswd_server = ads.company.com
}
[domain_realm]
.company.com = COMPANY.COM
company.com = COMPANY.COM
#
# kinit -k sapldap/ads.company.com at COMPANY.COM
kinit(v5): Key table entry not found while getting initial credentials
#
When I use it without -k option, it works and prompts for password and only takes correct password.
klist shows recent date and expiration time.
Ray
On Apr 22, 2013, at 2:01 PM, "Nebergall, Christopher" <cneberg at sandia.gov> wrote:
> Do you need to have allow_weak_crypto = true set in your krb5.conf?
>
> -Christopher
> -----Original Message-----
> From: kerberos-bounces at mit.edu [mailto:kerberos-bounces at mit.edu] On Behalf Of Ray Vand
> Sent: Monday, April 22, 2013 3:38 PM
> To: Benjamin Kaduk
> Cc: kerberos at mit.edu
> Subject: [EXTERNAL] Re: Issue with Kerberos setting in Sun Solaris 10
>
> Ben,
>
> The space is added when I cut and paste from terminal. I forgot to fix it in the email.
> it prompts for password and it takes it. I even tried wrong password and I got error. Which mean it is communicating with KDC.
>
> Also I am using MIT Kerberos version krb5-1.11.1-signed.tar which I download it from MIT site.
>
> Ray
>
> On Apr 22, 2013, at 1:27 PM, Benjamin Kaduk <kaduk at mit.edu> wrote:
>
>> [putting the list back in the cc]
>>
>> On Mon, 22 Apr 2013, Ray Vand wrote:
>>
>>> Ben,
>>>
>>> kvno was 9 because I gave a new value in addent command.
>>>
>>> ktutil: addent -password -p sapldap/ads.company.com at COMPANY.COM -k 9 -e DES-CBC-MD5
>>
>> Ah, okay. As I said earlier, I don't think this kvno will affect 'kinit -k', but is relevant when used as an acceptor.
>>
>>> I created a new one with kvno 7 and tried it. Still getting initial credentials error.
>>
>> Right, I wouldn't expect that to change.
>>
>> Some ways of generating a keytab will increment the kvno on the KDC, which will cause problems for existing keytabs; it sounds like that is not what is causing this problem.
>>
>>> ktutil: addent -password -p sapldap/ads.company.com@ COMPANY.COM -k 7 -e DES-CBC-MD5
>>> Password for sapldap/ads.company.com@ COMPANY.COM:
>>> ktutil: list
>>> slot KVNO Principal
>>> ---- ---- ---------------------------------------------------------------------
>>> 1 7 sapldap/ads.company.com@ COMPANY.COM
>>> ktutil: wkt /tmp/ray.keytab
>>> ktutil: q
>>>
>>> # cp /tmp/ray.keytab /etc/krb5/krb5.keytab
>>>
>>> # kinit -k -t /etc/krb5/krb5.keytab sapldap/ads.company.com@ COMPANY.COM
>>> kinit(v5): Key table entry not found while getting initial credentials
>>
>> I assume the space between '@' and "COMPANY.COM" is introduced while transcribing into email? If it is present in the actual command line it may cause problems.
>>
>> You never did say if you are using the Solaris integrated tools or an external installation of MIT kerberos.
>>
>> -Ben
>
>
> ________________________________________________
> Kerberos mailing list Kerberos at mit.edu
> https://mailman.mit.edu/mailman/listinfo/kerberos
>
More information about the Kerberos
mailing list