Fwd: Authentication issues using cyrus-sasl from librdkafka on CentOSVM with Kerberos

Fabiano Tarlao ftarlao at gmail.com
Sun Jan 14 03:43:08 EST 2018


I'm a newbie and had a similar issue, in order to find out the right
principal for a service, I executed Wireshark on client or server node in a
test env... Wireshark kerberos dissector works quite well and tuo can see
details of requests, principals too. Perhaps this ke obvious but.. Not for
me :-(

Il 13 gen 2018 17:46, "Greg Hudson" <ghudson at mit.edu> ha scritto:

> My best guess is that there is a disagreement between the server
> principal name passed to kinit -S ("kafka/host") and the server
> principal name chosen by SASL GSSAPI.  At least, that's the most obvious
> way I can find to get a "Matching credential not found" error message
> from MIT krb5's GSSAPI library.  It's hard for me to be sure since I'm
> not seeing any krb5 trace logs resulting from the SASL operation, only
> from the kinit operation.  (I would expect to see at least trace logs
> like "Getting credentials <clientprinc> -> <serverprinc> using ccache
> <ccache>" and "Retrieving <clientprinc> -> <serverprinc> from <ccache>
> with result: ...")
>
> If you can configure rdkafka to acquire a TGT from the keytab instead of
> directly acquiring a service ticket (by removing "-S kafka/host" from
> the kinit command line), you could verify that this is the problem and
> to determine (using klist) what service ticket is acquired during
> authentication.
>
> ________________________________________________
> Kerberos mailing list           Kerberos at mit.edu
> https://mailman.mit.edu/mailman/listinfo/kerberos
>


More information about the Kerberos mailing list