[krbdev.mit.edu #2913] client kadm5_init incompatible with pre-1.4
Public Submitter via RT
rt-comment at krbdev.mit.edu
Mon Mar 21 23:18:17 EST 2005
[tlyu - Mon Mar 21 15:54:15 2005]:
> >>>>> "jd" == Public Submitter via RT <rt-comment at krbdev.mit.edu> writes:
>
> jd> [guest - Wed Mar 16 14:15:31 2005]:
> >>
> >> As I was saying (sorry about the previous "submit")...
> >>
> >> It seems like this fix breaks kadmin auth. with keytab. For example:
> >>
> >> # kadmin -p host/binky.foonon.com -k -t /etc/krb5.keytab
> >> Authenticating as principal host/binky.foonon.com with
> >> keytab /etc/krb5.keytab.
> >> kadmin: Cannot find KDC for requested realm while initializing kadmin
> >> interface
> >>
> >> jd
>
> jd> Also, this seems to not happen when the kadmin server is running on a
> jd> pre-1.4 KDC
>
> This seems like it may be a bug exposed due to a misconfigured
> domain_realm mapping. Are the pre-1.4 KDC and the 1.4 KDC running on
> the same host? Does the kadmin client without a keytab work correctly
> on the same host from which you attempt to use kadmin with the keytab?
>
> ---Tom
I had the sense of things messed up, sorry. What I *meant* to say is
that it *doesn't* happen when the kadmin server is using RPCSEC_GSS.
I'm working in two different Kerberos environments: one using a 1.28 MIT
KDC, the other using a Solaris 10 KDC.
With the 'kadmin classic' server (v1.28, patched), and the new (1.4
patched) kadmin client, "kadmin -k" would fail, but "kadmin -O -k" would
work just fine (while password and ccache auth would work without the
"-O"). On the same system, connecting to the same kadmind, a v1.35
kadmin would work just fine in all three cases.
I'll double-check the domain_realm mapping, but I'm fairly certain that
it's okay since everything else works.
jd
More information about the krb5-bugs
mailing list