[krbdev.mit.edu #5954] ksu fails without domain_realm mapping for local host

Public Submitter via RT rt-comment at krbdev.mit.edu
Tue Apr 29 00:43:44 EDT 2008


Here is a trace from a ksu built with debugging support:

wanderer:~> ./ksu -D
GET_best_princ_for_target: via prompt passwd list choice: approximation
of princ in trials # 0 
GET_best_princ_for_target result-best principal rra/root at stanford.edu 
 source cache =  FILE:/tmp/krb5cc_1000
 target cache =  FILE:/tmp/krb5cc_0.1
krb5_check_exp: the krb5_clockskew is 300 
krb5_check_exp: currenttime - endtime -82497 
krb5_check_exp: the krb5_clockskew is 300 
krb5_check_exp: currenttime - endtime -82497 
krb5_check_exp: the krb5_clockskew is 300 
krb5_check_exp: currenttime - endtime -82497 
 krb5_auth_check: Client principal name: rra/root at stanford.edu
 krb5_auth_check: Server principal name: host/wanderer.stanford.edu@
ksu: Matching credential not found While Retrieving credentials
 local tgt principal name: krbtgt/stanford.edu at stanford.edu
WARNING: Your password may be exposed if you enter it here and are logged 
         in remotely using an unsecure (non-encrypted) channel. 
Kerberos password for rra/root at stanford.edu: : 
krb5_auth_check: got ticket for end server 
 out_creds->server: host/wanderer.stanford.edu@
krb5_verify_tkt_def: verifying target server
 server: host/wanderer.stanford.edu@
 tkt->server: host/wanderer.stanford.edu at stanford.edu
ksu: Wrong principal in request while verifying ticket for server
Authentication failed.

The problem appears to stem from the fact that ksu rolls its own ticket
verification and doesn't use krb5_verify_init_creds.  Is there some
reason why it doesn't do this, or does it just predate that API?  If it
just predates the API, I might be able to take a shot at producing a patch.



More information about the krb5-bugs mailing list