gss_init_sec_context with delegated_cred_handle error

Xie, Hugh hugh.xie at bankofamerica.com
Thu Oct 23 11:58:23 EDT 2014


The mailing server mess up the string of the principal into email

Here is uppercase principal "USERID @ MY.DOMAIN.COM" and the lower case principal is "userid @ my.domain.com"


From: Xie, Hugh
Sent: Thursday, October 23, 2014 11:39 AM
To: <kerberos at mit.edu>
Subject: gss_init_sec_context with delegated_cred_handle error

Hi,

When I pass GSS_C_NO_CREDENTIAL as cred_handle to gss_init_sec_context(), I got no error. But when I pass delegated_cred_handle (output from gss_accept_sec_context) as cred_handle to gss_init_sec_context(), I got 'Matching credential not found' error. It seems that when passing delegated_cred_handle gss_init_sec_context care about ticket cache. In my case the default principal in the ticket cache was upper case USERID at MY.DOMAIN.COM<mailto:USERID at MY.DOMAIN.COM>. Currently, I can remedy the situation by running a 'kinit userid at MY.DOMAIN.COM<mailto:userid at MY.DOMAIN.COM> -t -v $KRB5_KTNAME' to create a lower case default principal userid at MY.DOMAIN.COM<mailto:userid at MY.DOMAIN.COM>.

I have two questions:

1.      Why gss_init_sec_context care about ticket cache default principal when using delegated_cred_handle? Why it works when I am not delegating?

2.      Is there a better approach to remedy this problem other than kinit since the ticket cache could expire overtime, I am running a web service that could stop working if it expires? Is there a code based solution?

I am using krb5 version 1.11.5

----------------------------------------------------------------------
This message, and any attachments, is for the intended recipient(s) only, may contain information that is privileged, confidential and/or proprietary and subject to important terms and conditions available at http://www.bankofamerica.com/emaildisclaimer.   If you are not the intended recipient, please delete this message.


More information about the Kerberos mailing list