yaooqinn opened a new issue #1145: URL: https://github.com/apache/incubator-kyuubi/issues/1145
### Code of Conduct - [X] I agree to follow this project's [Code of Conduct](https://www.apache.org/foundation/policies/conduct) ### Search before asking - [X] I have searched in the [issues](https://github.com/apache/incubator-kyuubi/issues?q=is%3Aissue) and found no similar issues. ### Describe the bug ``` HadoopFsDelegationTokenProviderSuite: >>>DEBUG: TCPClient reading 173 bytes >>> KrbKdcReq send: #bytes read=173 >>>Pre-Authentication Data: PA-DATA type = 19 PA-ETYPE-INFO2 etype = 17, salt = null, s2kparams = null >>> KdcAccessibility: remove localhost:50936 >>> KDCRep: init() encoding tag is 126 req type is 11 >>>KRBError: sTime is Fri Sep 24 10:40:47 CST 2021 1632451247000 suSec is 100 error code is 25 error Message is Additional pre-authentication required sname is client/[email protected] eData provided. msgType is 30 >>>Pre-Authentication Data: PA-DATA type = 19 PA-ETYPE-INFO2 etype = 17, salt = null, s2kparams = null KRBError received: Additional pre-authentication required KrbAsReqBuilder: PREAUTH FAILED/REQ, re-send AS-REQ default etypes for default_tkt_enctypes: 17. Looking for keys for: client/[email protected] Added key: 16version: 1 Added key: 17version: 1 Looking for keys for: client/[email protected] Added key: 16version: 1 Added key: 17version: 1 default etypes for default_tkt_enctypes: 17. >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType >>> KrbAsReq creating message >>> KrbKdcReq send: kdc=localhost TCP:50936, timeout=30000, number of retries =3, #bytes=260 >>> KDCCommunication: kdc=localhost TCP:50936, timeout=30000,Attempt =1, #bytes=260 >>>DEBUG: TCPClient reading 620 bytes >>> KrbKdcReq send: #bytes read=620 >>> KdcAccessibility: remove localhost:50936 Looking for keys for: client/[email protected] Added key: 16version: 1 Added key: 17version: 1 >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType >>> KrbAsRep cons in KrbAsReq.getReply client/localhost Java config name: /Users/kentyao/incubator-kyuubi/kyuubi-server/target/scala-2.12/test-classes/kyuubi-kdc-56ab1039-e2ee-4919-be62-09950f8a9436/1632451140185/krb5.conf Loaded from Java config >>> KdcAccessibility: reset Looking for keys for: client/[email protected] Added key: 16version: 1 Added key: 17version: 1 Looking for keys for: client/[email protected] Added key: 16version: 1 Added key: 17version: 1 default etypes for default_tkt_enctypes: 17. >>> KrbAsReq creating message >>> KrbKdcReq send: kdc=localhost TCP:50936, timeout=30000, number of retries =3, #bytes=172 >>> KDCCommunication: kdc=localhost TCP:50936, timeout=30000,Attempt =1, #bytes=172 >>>DEBUG: TCPClient reading 173 bytes >>> KrbKdcReq send: #bytes read=173 >>>Pre-Authentication Data: PA-DATA type = 19 PA-ETYPE-INFO2 etype = 17, salt = null, s2kparams = null >>> KdcAccessibility: remove localhost:50936 >>> KDCRep: init() encoding tag is 126 req type is 11 >>>KRBError: sTime is Fri Sep 24 10:40:48 CST 2021 1632451248000 suSec is 100 error code is 25 error Message is Additional pre-authentication required sname is client/[email protected] eData provided. msgType is 30 >>>Pre-Authentication Data: PA-DATA type = 19 PA-ETYPE-INFO2 etype = 17, salt = null, s2kparams = null KRBError received: Additional pre-authentication required KrbAsReqBuilder: PREAUTH FAILED/REQ, re-send AS-REQ default etypes for default_tkt_enctypes: 17. Looking for keys for: client/[email protected] Added key: 16version: 1 Added key: 17version: 1 Looking for keys for: client/[email protected] Added key: 16version: 1 Added key: 17version: 1 default etypes for default_tkt_enctypes: 17. >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType >>> KrbAsReq creating message >>> KrbKdcReq send: kdc=localhost TCP:50936, timeout=30000, number of retries =3, #bytes=260 >>> KDCCommunication: kdc=localhost TCP:50936, timeout=30000,Attempt =1, #bytes=260 >>>DEBUG: TCPClient reading 620 bytes >>> KrbKdcReq send: #bytes read=620 >>> KdcAccessibility: remove localhost:50936 Looking for keys for: client/[email protected] Added key: 16version: 1 Added key: 17version: 1 >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType >>> KrbAsRep cons in KrbAsReq.getReply client/localhost Formatting using clusterid: testClusterID Java config name: /Users/kentyao/incubator-kyuubi/kyuubi-server/target/scala-2.12/test-classes/kyuubi-kdc-56ab1039-e2ee-4919-be62-09950f8a9436/1632451140185/krb5.conf Loaded from Java config >>> KdcAccessibility: reset Looking for keys for: client/[email protected] Added key: 16version: 1 Added key: 17version: 1 Looking for keys for: client/[email protected] Added key: 16version: 1 Added key: 17version: 1 default etypes for default_tkt_enctypes: 17. >>> KrbAsReq creating message >>> KrbKdcReq send: kdc=localhost TCP:50936, timeout=30000, number of retries =3, #bytes=172 >>> KDCCommunication: kdc=localhost TCP:50936, timeout=30000,Attempt =1, #bytes=172 >>>DEBUG: TCPClient reading 173 bytes >>> KrbKdcReq send: #bytes read=173 >>>Pre-Authentication Data: PA-DATA type = 19 PA-ETYPE-INFO2 etype = 17, salt = null, s2kparams = null >>> KdcAccessibility: remove localhost:50936 >>> KDCRep: init() encoding tag is 126 req type is 11 >>>KRBError: sTime is Fri Sep 24 10:40:49 CST 2021 1632451249000 suSec is 100 error code is 25 error Message is Additional pre-authentication required sname is client/[email protected] eData provided. msgType is 30 >>>Pre-Authentication Data: PA-DATA type = 19 PA-ETYPE-INFO2 etype = 17, salt = null, s2kparams = null KRBError received: Additional pre-authentication required KrbAsReqBuilder: PREAUTH FAILED/REQ, re-send AS-REQ default etypes for default_tkt_enctypes: 17. Looking for keys for: client/[email protected] Added key: 16version: 1 Added key: 17version: 1 Looking for keys for: client/[email protected] Added key: 16version: 1 Added key: 17version: 1 default etypes for default_tkt_enctypes: 17. >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType >>> KrbAsReq creating message >>> KrbKdcReq send: kdc=localhost TCP:50936, timeout=30000, number of retries =3, #bytes=260 >>> KDCCommunication: kdc=localhost TCP:50936, timeout=30000,Attempt =1, #bytes=260 >>>DEBUG: TCPClient reading 620 bytes >>> KrbKdcReq send: #bytes read=620 >>> KdcAccessibility: remove localhost:50936 Looking for keys for: client/[email protected] Added key: 16version: 1 Added key: 17version: 1 >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType >>> KrbAsRep cons in KrbAsReq.getReply client/localhost isSaslEnabled:false Opened streaming server at /0.0.0.0:1025 Successfully obtained privileged resources (streaming port = ServerSocket[addr=/0:0:0:0:0:0:0:0,localport=1025] ) (http listener port = 9864) Opened info server at /0.0.0.0:9864 Java config name: /Users/kentyao/incubator-kyuubi/kyuubi-server/target/scala-2.12/test-classes/kyuubi-kdc-56ab1039-e2ee-4919-be62-09950f8a9436/1632451140185/krb5.conf Loaded from Java config >>> KdcAccessibility: reset Looking for keys for: client/[email protected] Added key: 16version: 1 Added key: 17version: 1 Looking for keys for: client/[email protected] Added key: 16version: 1 Added key: 17version: 1 default etypes for default_tkt_enctypes: 17. >>> KrbAsReq creating message >>> KrbKdcReq send: kdc=localhost TCP:50936, timeout=30000, number of retries =3, #bytes=172 >>> KDCCommunication: kdc=localhost TCP:50936, timeout=30000,Attempt =1, #bytes=172 >>>DEBUG: TCPClient reading 173 bytes >>> KrbKdcReq send: #bytes read=173 >>>Pre-Authentication Data: PA-DATA type = 19 PA-ETYPE-INFO2 etype = 17, salt = null, s2kparams = null >>> KdcAccessibility: remove localhost:50936 >>> KDCRep: init() encoding tag is 126 req type is 11 >>>KRBError: sTime is Fri Sep 24 10:40:54 CST 2021 1632451254000 suSec is 100 error code is 25 error Message is Additional pre-authentication required sname is client/[email protected] eData provided. msgType is 30 >>>Pre-Authentication Data: PA-DATA type = 19 PA-ETYPE-INFO2 etype = 17, salt = null, s2kparams = null KRBError received: Additional pre-authentication required KrbAsReqBuilder: PREAUTH FAILED/REQ, re-send AS-REQ default etypes for default_tkt_enctypes: 17. Looking for keys for: client/[email protected] Added key: 16version: 1 Added key: 17version: 1 Looking for keys for: client/[email protected] Added key: 16version: 1 Added key: 17version: 1 default etypes for default_tkt_enctypes: 17. >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType >>> KrbAsReq creating message >>> KrbKdcReq send: kdc=localhost TCP:50936, timeout=30000, number of retries =3, #bytes=260 >>> KDCCommunication: kdc=localhost TCP:50936, timeout=30000,Attempt =1, #bytes=260 >>>DEBUG: TCPClient reading 620 bytes >>> KrbKdcReq send: #bytes read=620 >>> KdcAccessibility: remove localhost:50936 Looking for keys for: client/[email protected] Added key: 16version: 1 Added key: 17version: 1 >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType >>> KrbAsRep cons in KrbAsReq.getReply client/localhost Found ticket for client/[email protected] to go to krbtgt/[email protected] expiring on Thu Jun 20 10:40:54 CST 2024 Entered Krb5Context.initSecContext with state=STATE_NEW Found ticket for client/[email protected] to go to krbtgt/[email protected] expiring on Thu Jun 20 10:40:54 CST 2024 Service ticket not found in the subject >>> Credentials acquireServiceCreds: same realm default etypes for default_tgs_enctypes: 17. >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType >>> CksumType: sun.security.krb5.internal.crypto.HmacSha1Aes128CksumType >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType >>> KrbKdcReq send: kdc=localhost TCP:50936, timeout=30000, number of retries =3, #bytes=639 >>> KDCCommunication: kdc=localhost TCP:50936, timeout=30000,Attempt =1, #bytes=639 >>>DEBUG: TCPClient reading 585 bytes >>> KrbKdcReq send: #bytes read=585 >>> KdcAccessibility: remove localhost:50936 >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType >>> KrbApReq: APOptions are 00100000 00000000 00000000 00000000 >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType Krb5Context setting mySeqNumber to: 954773118 Created InitSecContextToken: 0000: 01 00 6E 82 02 0B 30 82 02 07 A0 03 02 01 05 A1 ..n...0......... 0010: 03 02 01 0E A2 07 03 05 00 20 00 00 00 A3 82 01 ......... ...... 0020: 16 61 82 01 12 30 82 01 0E A0 03 02 01 05 A1 1A .a...0.......... 0030: 1B 18 4B 45 52 42 45 52 49 5A 45 44 54 45 53 54 ..KERBERIZEDTEST 0040: 48 45 4C 50 45 52 2E 43 4F 4D A2 1E 30 1C A0 03 HELPER.COM..0... 0050: 02 01 00 A1 15 30 13 1B 06 63 6C 69 65 6E 74 1B .....0...client. 0060: 09 6C 6F 63 61 6C 68 6F 73 74 A3 81 CA 30 81 C7 .localhost...0.. 0070: A0 03 02 01 11 A1 03 02 01 01 A2 81 BA 04 81 B7 ................ 0080: 0C 42 B8 BB FD 65 27 29 10 44 E1 37 9D C0 65 2C .B...e').D.7..e, 0090: 1D 97 1A A4 A9 91 F2 C4 CE 02 97 A2 F4 65 15 6A .............e.j 00A0: F7 79 01 7B 57 EE 67 75 64 47 D4 E6 BB 6A 00 69 .y..W.gudG...j.i 00B0: 16 62 AE 00 2E 11 88 F3 6E 17 6E 2F 37 C6 F7 64 .b......n.n/7..d 00C0: 7A 80 F7 8E A4 EA 9E BD AE 58 D4 F4 5C 0B A2 39 z........X..\..9 00D0: 8C B0 B6 A5 D3 2E EB F2 2C E5 A4 E2 52 9F 0C F8 ........,...R... 00E0: F7 3F 48 A5 59 5C ED B7 37 AF E5 E5 E5 36 96 B9 .?H.Y\..7....6.. 00F0: 20 70 0F 6C DE 47 67 23 94 5C FF 99 EE 50 40 90 p.l.Gg#.\...P@. 0100: 56 B7 CA 54 ED 9E 0E 07 97 C5 EE 80 D5 28 2B CD V..T.........(+. 0110: FE A2 31 F2 28 DE 71 6B E6 B7 99 E0 66 45 6C 00 ..1.(.qk....fEl. 0120: 69 48 51 B1 74 BF 0C 74 48 EA 76 C5 30 27 39 D4 iHQ.t..tH.v.0'9. 0130: 56 45 9F 03 F0 35 C4 A4 81 D7 30 81 D4 A0 03 02 VE...5....0..... 0140: 01 11 A2 81 CC 04 81 C9 E0 9C A4 A0 F5 71 D0 BC .............q.. 0150: DC 65 A4 64 AE 75 D3 BE 43 98 38 71 AF 26 D1 5B .e.d.u..C.8q.&.[ 0160: EC B4 E2 30 7A 36 C0 69 2E FC D8 54 C5 C7 86 AB ...0z6.i...T.... 0170: E4 84 A6 A9 5D 50 5D 0A 5A CC 27 62 52 7D 1E 7F ....]P].Z.'bR... 0180: C4 EA A4 96 3E 28 91 02 BB 86 D8 97 E6 84 A2 18 ....>(.......... 0190: 8B 36 6B F1 0E F1 7F 3A 2B 93 F1 9C B2 83 62 D3 .6k....:+.....b. 01A0: 98 24 41 ED 6B B5 75 7A 2D D8 74 30 5E 9F 75 FA .$A.k.uz-.t0^.u. 01B0: D2 3C 27 4F B3 C4 D8 B1 56 9F 0B 12 56 B5 DC 8A .<'O....V...V... 01C0: B9 E4 96 6B 74 1E 05 A8 03 97 5D 4C 2F 4F 91 A3 ...kt.....]L/O.. 01D0: 0B 50 61 D3 98 0F 40 F0 5A 0D 9B C3 CA 70 DA 3A [email protected].: 01E0: CC 03 DA 21 D0 68 24 67 63 AE C6 53 B3 C2 63 32 ...!.h$gc..S..c2 01F0: 5D A0 6E FD D3 44 FA 75 7E B5 6C 77 04 DC 23 05 ].n..D.u..lw..#. 0200: D4 02 4F A0 3F 08 DA EB B1 EB 0A A7 86 FE 97 76 ..O.?..........v 0210: 08 . Found KeyTab /Users/kentyao/incubator-kyuubi/kyuubi-server/target/scala-2.12/test-classes/kyuubi-kdc-56ab1039-e2ee-4919-be62-09950f8a9436/kyuubi-test.keytab for client/[email protected] Found ticket for client/[email protected] to go to krbtgt/[email protected] expiring on Thu Jun 20 10:40:54 CST 2024 Entered Krb5Context.acceptSecContext with state=STATE_NEW Looking for keys for: client/[email protected] Added key: 16version: 1 Added key: 17version: 1 >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType Using builtin default etypes for permitted_enctypes default etypes for permitted_enctypes: 18 17 16 23. >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType MemoryCache: add 1632451256/735901/950FAB11DE5DBEE5A294D0BC8AE2C51A/client/[email protected] to client/[email protected]|client/[email protected] >>> KrbApReq: authenticate succeed. Krb5Context setting peerSeqNumber to: 954773118 >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType Krb5Context setting mySeqNumber to: 765865618 Entered Krb5Context.initSecContext with state=STATE_IN_PROCESS >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType Krb5Context setting peerSeqNumber to: 765865618 Krb5Context.wrap: data=[01 01 00 00 ] Krb5Context.wrap: token=[05 04 01 ff 00 0c 00 00 00 00 00 00 2d a6 2e 92 01 01 00 00 80 c3 92 55 fb 89 0d 21 28 c7 5f 2d ] Krb5Context.unwrap: token=[05 04 01 ff 00 0c 00 00 00 00 00 00 2d a6 2e 92 01 01 00 00 80 c3 92 55 fb 89 0d 21 28 c7 5f 2d ] Krb5Context.unwrap: data=[01 01 00 00 ] Krb5Context.wrap: data=[01 01 00 00 ] Krb5Context.wrap: token=[05 04 00 ff 00 0c 00 00 00 00 00 00 38 e8 ae 7e 01 01 00 00 56 63 d4 57 f6 33 9b 63 94 ce 7f e3 ] Krb5Context.unwrap: token=[05 04 00 ff 00 0c 00 00 00 00 00 00 38 e8 ae 7e 01 01 00 00 56 63 d4 57 f6 33 9b 63 94 ce 7f e3 ] Krb5Context.unwrap: data=[01 01 00 00 ] Found ticket for client/[email protected] to go to krbtgt/[email protected] expiring on Thu Jun 20 10:40:54 CST 2024 Entered Krb5Context.initSecContext with state=STATE_NEW Found ticket for client/[email protected] to go to krbtgt/[email protected] expiring on Thu Jun 20 10:40:54 CST 2024 Found ticket for client/[email protected] to go to client/[email protected] expiring on Thu Jun 20 10:40:56 CST 2024 Found service ticket in the subjectTicket (hex) = 0000: 61 82 01 12 30 82 01 0E A0 03 02 01 05 A1 1A 1B a...0........... 0010: 18 4B 45 52 42 45 52 49 5A 45 44 54 45 53 54 48 .KERBERIZEDTESTH 0020: 45 4C 50 45 52 2E 43 4F 4D A2 1E 30 1C A0 03 02 ELPER.COM..0.... 0030: 01 00 A1 15 30 13 1B 06 63 6C 69 65 6E 74 1B 09 ....0...client.. 0040: 6C 6F 63 61 6C 68 6F 73 74 A3 81 CA 30 81 C7 A0 localhost...0... 0050: 03 02 01 11 A1 03 02 01 01 A2 81 BA 04 81 B7 0C ................ 0060: 42 B8 BB FD 65 27 29 10 44 E1 37 9D C0 65 2C 1D B...e').D.7..e,. 0070: 97 1A A4 A9 91 F2 C4 CE 02 97 A2 F4 65 15 6A F7 ............e.j. 0080: 79 01 7B 57 EE 67 75 64 47 D4 E6 BB 6A 00 69 16 y..W.gudG...j.i. 0090: 62 AE 00 2E 11 88 F3 6E 17 6E 2F 37 C6 F7 64 7A b......n.n/7..dz 00A0: 80 F7 8E A4 EA 9E BD AE 58 D4 F4 5C 0B A2 39 8C ........X..\..9. 00B0: B0 B6 A5 D3 2E EB F2 2C E5 A4 E2 52 9F 0C F8 F7 .......,...R.... 00C0: 3F 48 A5 59 5C ED B7 37 AF E5 E5 E5 36 96 B9 20 ?H.Y\..7....6.. 00D0: 70 0F 6C DE 47 67 23 94 5C FF 99 EE 50 40 90 56 p.l.Gg#.\[email protected] 00E0: B7 CA 54 ED 9E 0E 07 97 C5 EE 80 D5 28 2B CD FE ..T.........(+.. 00F0: A2 31 F2 28 DE 71 6B E6 B7 99 E0 66 45 6C 00 69 .1.(.qk....fEl.i 0100: 48 51 B1 74 BF 0C 74 48 EA 76 C5 30 27 39 D4 56 HQ.t..tH.v.0'9.V 0110: 45 9F 03 F0 35 C4 E...5. Client Principal = client/[email protected] Server Principal = client/[email protected] Session Key = EncryptionKey: keyType=17 keyBytes (hex dump)= 0000: 4F 14 BD EC 31 C6 85 B6 AA 00 78 63 36 B8 40 D1 O...1.....xc6.@. ``` we shall suppress these noises ### Affects Version(s) 1.4.0 ### Kyuubi Server Log Output _No response_ ### Kyuubi Engine Log Output _No response_ ### Kyuubi Server Configurations _No response_ ### Kyuubi Engine Configurations _No response_ ### Additional context _No response_ ### Are you willing to submit PR? - [ ] Yes I am willing to submit a PR! -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: [email protected] For queries about this service, please contact Infrastructure at: [email protected]
