Broken auth, LDAP dbargs stopped working
Gergely Czuczy
gergely.czuczy at harmless.hu
Fri May 15 05:02:18 EDT 2015
Most of these turned out to be an LDAP syncrepl issue, which solved many
of the problems. After a reboot, the "wrong principal in request"
message also disappeared, however it's still not clear what caused this
error message.
What remains is the following, when I'm trying to authenticate to a
service, but now ssh works:
(('Unspecified GSS failure. Minor code may provide more information',
851968), ('Success', 100001))
I'm running pykerberos's test.py, when having an initialized user principal:
python test.py -s host@`hostname` gssapi
It's reading the princ from /etc/krb5.keytab
I've traced it back to pykerberos1.2.2's (github has 1.1.2 FYI)
src/kerberosgss.c:644, it's a call to gss_accept_sec_context() in
authenticate_gss_server_step(), which returns 851968/100001 for the
major/minor code.
Anyone has any idea where to dig, and what to look for to get this
sorted out? This error message seems kinda strange.
The KVNOs are all right, DNS forward+reverse is matches and working
properly, I can init with the keytabs, and after such a test, I can see
the SPN showing up in klist:
# klist
Default principal: user at REALM
Valid starting Expires Service principal
(...)
05/15/15 08:41:09 05/16/15 08:31:52 host/$hostname at REALM
When setting KRB5_TRACE, it writes the following:
[17374] 1431680361.377998: ccselect module realm chose cache
FILE:/tmp/krb5cc_0 with client principal $user at REALM for server
principal host/$hostname at REALM
[17374] 1431680361.378177: Retrieving $user at REALM ->
krb5_ccache_conf_data/proxy_impersonator at X-CACHECONF: from
FILE:/tmp/krb5cc_0 with result: -1765328243/Matching credential not found
[17374] 1431680361.378207: Getting credentials $user at REALM ->
host/$hostname at REALM using ccache FILE:/tmp/krb5cc_0
[17374] 1431680361.378271: Retrieving $user at REALM ->
host/$hostname at REALM from FILE:/tmp/krb5cc_0 with result: 0/Success
[17374] 1431680361.378347: Creating authenticator for $user at REALM ->
host/$hostname at REALM, seqnum 355886755, subkey aes256-cts/EC84, session
key aes256-cts/CA36
[17374] 1431680361.378694: Decrypted AP-REQ with server principal
host/$hostname at REALM: aes256-cts/FBE1
[17374] 1431680361.378711: AP-REQ ticket: $user at REALM ->
host/$hostname at REALM, session key aes256-cts/CA36
[17374] 1431680361.379501: Negotiated enctype based on authenticator:
aes256-cts
[17374] 1431680361.379515: Authenticator contains subkey: aes256-cts/EC84
So, what should I be looking for, when the minor code is a success?
On 2015-05-13 16:02, Gergely Czuczy wrote:
> Hello,
>
> I have an installation of MIT Kerberos with an OpenLDAP backend, on CentOS6:
> krb5-devel-1.10.3-37.el6_6.x86_64
> krb5-workstation-1.10.3-37.el6_6.x86_64
> krb5-server-ldap-1.10.3-37.el6_6.x86_64
> krb5-server-1.10.3-37.el6_6.x86_64
>
> And starting of today, for some unknown reason, it started misbehaving.
> First was, one of the boxes refuses kerberos authentication, getting the
> following error message:
> (('Unspecified GSS failure. Minor code may provide more information',
> 851968), ('Success', 100001))
> A couple of times, I also got "Wrong principal in request" for the minor
> code, however at this very moment, I cannot reproduce that one.
>
> This is a web application, which worked yesterday. Also, ssh with GSSAPI
> auth works all over the boxes, except for this one, it always falls back
> to PAM.
>
> What's also strange is, I've used to store the principals of users and
> hosts in LDAP, in their respective entries, under
> ou=(users,hosts),dc=..., respectively. Now, whenever I do an addprinc
> with -x dn=$dn, the principal is getting added, but it's not showing up
> under the entity's LDAP entry.
>
> Clock is in sync, the DNS entries back and forward are properly done.
>
> I'm at a loss, I'm running out of ideas where to look for. Could someone
> please give me a couple of suggestions, where and what to look for? This
> stuff used to work, but for some unknown reason it stopped working.
> krb5kdc.log and kadmin.log are silent of any errors, as I've checked.
>
> Thanks in advance,
> Gergely
>
> ________________________________________________
> Kerberos mailing list Kerberos at mit.edu
> https://mailman.mit.edu/mailman/listinfo/kerberos
More information about the Kerberos
mailing list