yaooqinn opened a new issue #1145:
URL: https://github.com/apache/incubator-kyuubi/issues/1145


   ### Code of Conduct
   
   - [X] I agree to follow this project's [Code of 
Conduct](https://www.apache.org/foundation/policies/conduct)
   
   
   ### Search before asking
   
   - [X] I have searched in the 
[issues](https://github.com/apache/incubator-kyuubi/issues?q=is%3Aissue) and 
found no similar issues.
   
   
   ### Describe the bug
   
   ```
   HadoopFsDelegationTokenProviderSuite:
   >>>DEBUG: TCPClient reading 173 bytes
   >>> KrbKdcReq send: #bytes read=173
   >>>Pre-Authentication Data:
         PA-DATA type = 19
         PA-ETYPE-INFO2 etype = 17, salt = null, s2kparams = null
   
   >>> KdcAccessibility: remove localhost:50936
   >>> KDCRep: init() encoding tag is 126 req type is 11
   >>>KRBError:
         sTime is Fri Sep 24 10:40:47 CST 2021 1632451247000
         suSec is 100
         error code is 25
         error Message is Additional pre-authentication required
         sname is client/[email protected]
         eData provided.
         msgType is 30
   >>>Pre-Authentication Data:
         PA-DATA type = 19
         PA-ETYPE-INFO2 etype = 17, salt = null, s2kparams = null
   
   KRBError received: Additional pre-authentication required
   KrbAsReqBuilder: PREAUTH FAILED/REQ, re-send AS-REQ
   default etypes for default_tkt_enctypes: 17.
   Looking for keys for: client/[email protected]
   Added key: 16version: 1
   Added key: 17version: 1
   Looking for keys for: client/[email protected]
   Added key: 16version: 1
   Added key: 17version: 1
   default etypes for default_tkt_enctypes: 17.
   >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType
   >>> KrbAsReq creating message
   >>> KrbKdcReq send: kdc=localhost TCP:50936, timeout=30000, number of 
retries =3, #bytes=260
   >>> KDCCommunication: kdc=localhost TCP:50936, timeout=30000,Attempt =1, 
#bytes=260
   >>>DEBUG: TCPClient reading 620 bytes
   >>> KrbKdcReq send: #bytes read=620
   >>> KdcAccessibility: remove localhost:50936
   Looking for keys for: client/[email protected]
   Added key: 16version: 1
   Added key: 17version: 1
   >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType
   >>> KrbAsRep cons in KrbAsReq.getReply client/localhost
   Java config name: 
/Users/kentyao/incubator-kyuubi/kyuubi-server/target/scala-2.12/test-classes/kyuubi-kdc-56ab1039-e2ee-4919-be62-09950f8a9436/1632451140185/krb5.conf
   Loaded from Java config
   >>> KdcAccessibility: reset
   Looking for keys for: client/[email protected]
   Added key: 16version: 1
   Added key: 17version: 1
   Looking for keys for: client/[email protected]
   Added key: 16version: 1
   Added key: 17version: 1
   default etypes for default_tkt_enctypes: 17.
   >>> KrbAsReq creating message
   >>> KrbKdcReq send: kdc=localhost TCP:50936, timeout=30000, number of 
retries =3, #bytes=172
   >>> KDCCommunication: kdc=localhost TCP:50936, timeout=30000,Attempt =1, 
#bytes=172
   >>>DEBUG: TCPClient reading 173 bytes
   >>> KrbKdcReq send: #bytes read=173
   >>>Pre-Authentication Data:
         PA-DATA type = 19
         PA-ETYPE-INFO2 etype = 17, salt = null, s2kparams = null
   
   >>> KdcAccessibility: remove localhost:50936
   >>> KDCRep: init() encoding tag is 126 req type is 11
   >>>KRBError:
         sTime is Fri Sep 24 10:40:48 CST 2021 1632451248000
         suSec is 100
         error code is 25
         error Message is Additional pre-authentication required
         sname is client/[email protected]
         eData provided.
         msgType is 30
   >>>Pre-Authentication Data:
         PA-DATA type = 19
         PA-ETYPE-INFO2 etype = 17, salt = null, s2kparams = null
   
   KRBError received: Additional pre-authentication required
   KrbAsReqBuilder: PREAUTH FAILED/REQ, re-send AS-REQ
   default etypes for default_tkt_enctypes: 17.
   Looking for keys for: client/[email protected]
   Added key: 16version: 1
   Added key: 17version: 1
   Looking for keys for: client/[email protected]
   Added key: 16version: 1
   Added key: 17version: 1
   default etypes for default_tkt_enctypes: 17.
   >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType
   >>> KrbAsReq creating message
   >>> KrbKdcReq send: kdc=localhost TCP:50936, timeout=30000, number of 
retries =3, #bytes=260
   >>> KDCCommunication: kdc=localhost TCP:50936, timeout=30000,Attempt =1, 
#bytes=260
   >>>DEBUG: TCPClient reading 620 bytes
   >>> KrbKdcReq send: #bytes read=620
   >>> KdcAccessibility: remove localhost:50936
   Looking for keys for: client/[email protected]
   Added key: 16version: 1
   Added key: 17version: 1
   >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType
   >>> KrbAsRep cons in KrbAsReq.getReply client/localhost
   Formatting using clusterid: testClusterID
   Java config name: 
/Users/kentyao/incubator-kyuubi/kyuubi-server/target/scala-2.12/test-classes/kyuubi-kdc-56ab1039-e2ee-4919-be62-09950f8a9436/1632451140185/krb5.conf
   Loaded from Java config
   >>> KdcAccessibility: reset
   Looking for keys for: client/[email protected]
   Added key: 16version: 1
   Added key: 17version: 1
   Looking for keys for: client/[email protected]
   Added key: 16version: 1
   Added key: 17version: 1
   default etypes for default_tkt_enctypes: 17.
   >>> KrbAsReq creating message
   >>> KrbKdcReq send: kdc=localhost TCP:50936, timeout=30000, number of 
retries =3, #bytes=172
   >>> KDCCommunication: kdc=localhost TCP:50936, timeout=30000,Attempt =1, 
#bytes=172
   >>>DEBUG: TCPClient reading 173 bytes
   >>> KrbKdcReq send: #bytes read=173
   >>>Pre-Authentication Data:
         PA-DATA type = 19
         PA-ETYPE-INFO2 etype = 17, salt = null, s2kparams = null
   
   >>> KdcAccessibility: remove localhost:50936
   >>> KDCRep: init() encoding tag is 126 req type is 11
   >>>KRBError:
         sTime is Fri Sep 24 10:40:49 CST 2021 1632451249000
         suSec is 100
         error code is 25
         error Message is Additional pre-authentication required
         sname is client/[email protected]
         eData provided.
         msgType is 30
   >>>Pre-Authentication Data:
         PA-DATA type = 19
         PA-ETYPE-INFO2 etype = 17, salt = null, s2kparams = null
   
   KRBError received: Additional pre-authentication required
   KrbAsReqBuilder: PREAUTH FAILED/REQ, re-send AS-REQ
   default etypes for default_tkt_enctypes: 17.
   Looking for keys for: client/[email protected]
   Added key: 16version: 1
   Added key: 17version: 1
   Looking for keys for: client/[email protected]
   Added key: 16version: 1
   Added key: 17version: 1
   default etypes for default_tkt_enctypes: 17.
   >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType
   >>> KrbAsReq creating message
   >>> KrbKdcReq send: kdc=localhost TCP:50936, timeout=30000, number of 
retries =3, #bytes=260
   >>> KDCCommunication: kdc=localhost TCP:50936, timeout=30000,Attempt =1, 
#bytes=260
   >>>DEBUG: TCPClient reading 620 bytes
   >>> KrbKdcReq send: #bytes read=620
   >>> KdcAccessibility: remove localhost:50936
   Looking for keys for: client/[email protected]
   Added key: 16version: 1
   Added key: 17version: 1
   >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType
   >>> KrbAsRep cons in KrbAsReq.getReply client/localhost
   isSaslEnabled:false
   Opened streaming server at /0.0.0.0:1025
   Successfully obtained privileged resources (streaming port = 
ServerSocket[addr=/0:0:0:0:0:0:0:0,localport=1025] ) (http listener port = 9864)
   Opened info server at /0.0.0.0:9864
   Java config name: 
/Users/kentyao/incubator-kyuubi/kyuubi-server/target/scala-2.12/test-classes/kyuubi-kdc-56ab1039-e2ee-4919-be62-09950f8a9436/1632451140185/krb5.conf
   Loaded from Java config
   >>> KdcAccessibility: reset
   Looking for keys for: client/[email protected]
   Added key: 16version: 1
   Added key: 17version: 1
   Looking for keys for: client/[email protected]
   Added key: 16version: 1
   Added key: 17version: 1
   default etypes for default_tkt_enctypes: 17.
   >>> KrbAsReq creating message
   >>> KrbKdcReq send: kdc=localhost TCP:50936, timeout=30000, number of 
retries =3, #bytes=172
   >>> KDCCommunication: kdc=localhost TCP:50936, timeout=30000,Attempt =1, 
#bytes=172
   >>>DEBUG: TCPClient reading 173 bytes
   >>> KrbKdcReq send: #bytes read=173
   >>>Pre-Authentication Data:
         PA-DATA type = 19
         PA-ETYPE-INFO2 etype = 17, salt = null, s2kparams = null
   
   >>> KdcAccessibility: remove localhost:50936
   >>> KDCRep: init() encoding tag is 126 req type is 11
   >>>KRBError:
         sTime is Fri Sep 24 10:40:54 CST 2021 1632451254000
         suSec is 100
         error code is 25
         error Message is Additional pre-authentication required
         sname is client/[email protected]
         eData provided.
         msgType is 30
   >>>Pre-Authentication Data:
         PA-DATA type = 19
         PA-ETYPE-INFO2 etype = 17, salt = null, s2kparams = null
   
   KRBError received: Additional pre-authentication required
   KrbAsReqBuilder: PREAUTH FAILED/REQ, re-send AS-REQ
   default etypes for default_tkt_enctypes: 17.
   Looking for keys for: client/[email protected]
   Added key: 16version: 1
   Added key: 17version: 1
   Looking for keys for: client/[email protected]
   Added key: 16version: 1
   Added key: 17version: 1
   default etypes for default_tkt_enctypes: 17.
   >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType
   >>> KrbAsReq creating message
   >>> KrbKdcReq send: kdc=localhost TCP:50936, timeout=30000, number of 
retries =3, #bytes=260
   >>> KDCCommunication: kdc=localhost TCP:50936, timeout=30000,Attempt =1, 
#bytes=260
   >>>DEBUG: TCPClient reading 620 bytes
   >>> KrbKdcReq send: #bytes read=620
   >>> KdcAccessibility: remove localhost:50936
   Looking for keys for: client/[email protected]
   Added key: 16version: 1
   Added key: 17version: 1
   >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType
   >>> KrbAsRep cons in KrbAsReq.getReply client/localhost
   Found ticket for client/[email protected] to go to 
krbtgt/[email protected] expiring on Thu Jun 20 
10:40:54 CST 2024
   Entered Krb5Context.initSecContext with state=STATE_NEW
   Found ticket for client/[email protected] to go to 
krbtgt/[email protected] expiring on Thu Jun 20 
10:40:54 CST 2024
   Service ticket not found in the subject
   >>> Credentials acquireServiceCreds: same realm
   default etypes for default_tgs_enctypes: 17.
   >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType
   >>> CksumType: sun.security.krb5.internal.crypto.HmacSha1Aes128CksumType
   >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType
   >>> KrbKdcReq send: kdc=localhost TCP:50936, timeout=30000, number of 
retries =3, #bytes=639
   >>> KDCCommunication: kdc=localhost TCP:50936, timeout=30000,Attempt =1, 
#bytes=639
   >>>DEBUG: TCPClient reading 585 bytes
   >>> KrbKdcReq send: #bytes read=585
   >>> KdcAccessibility: remove localhost:50936
   >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType
   >>> KrbApReq: APOptions are 00100000 00000000 00000000 00000000
   >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType
   Krb5Context setting mySeqNumber to: 954773118
   Created InitSecContextToken:
   0000: 01 00 6E 82 02 0B 30 82   02 07 A0 03 02 01 05 A1  ..n...0.........
   0010: 03 02 01 0E A2 07 03 05   00 20 00 00 00 A3 82 01  ......... ......
   0020: 16 61 82 01 12 30 82 01   0E A0 03 02 01 05 A1 1A  .a...0..........
   0030: 1B 18 4B 45 52 42 45 52   49 5A 45 44 54 45 53 54  ..KERBERIZEDTEST
   0040: 48 45 4C 50 45 52 2E 43   4F 4D A2 1E 30 1C A0 03  HELPER.COM..0...
   0050: 02 01 00 A1 15 30 13 1B   06 63 6C 69 65 6E 74 1B  .....0...client.
   0060: 09 6C 6F 63 61 6C 68 6F   73 74 A3 81 CA 30 81 C7  .localhost...0..
   0070: A0 03 02 01 11 A1 03 02   01 01 A2 81 BA 04 81 B7  ................
   0080: 0C 42 B8 BB FD 65 27 29   10 44 E1 37 9D C0 65 2C  .B...e').D.7..e,
   0090: 1D 97 1A A4 A9 91 F2 C4   CE 02 97 A2 F4 65 15 6A  .............e.j
   00A0: F7 79 01 7B 57 EE 67 75   64 47 D4 E6 BB 6A 00 69  .y..W.gudG...j.i
   00B0: 16 62 AE 00 2E 11 88 F3   6E 17 6E 2F 37 C6 F7 64  .b......n.n/7..d
   00C0: 7A 80 F7 8E A4 EA 9E BD   AE 58 D4 F4 5C 0B A2 39  z........X..\..9
   00D0: 8C B0 B6 A5 D3 2E EB F2   2C E5 A4 E2 52 9F 0C F8  ........,...R...
   00E0: F7 3F 48 A5 59 5C ED B7   37 AF E5 E5 E5 36 96 B9  .?H.Y\..7....6..
   00F0: 20 70 0F 6C DE 47 67 23   94 5C FF 99 EE 50 40 90   p.l.Gg#.\...P@.
   0100: 56 B7 CA 54 ED 9E 0E 07   97 C5 EE 80 D5 28 2B CD  V..T.........(+.
   0110: FE A2 31 F2 28 DE 71 6B   E6 B7 99 E0 66 45 6C 00  ..1.(.qk....fEl.
   0120: 69 48 51 B1 74 BF 0C 74   48 EA 76 C5 30 27 39 D4  iHQ.t..tH.v.0'9.
   0130: 56 45 9F 03 F0 35 C4 A4   81 D7 30 81 D4 A0 03 02  VE...5....0.....
   0140: 01 11 A2 81 CC 04 81 C9   E0 9C A4 A0 F5 71 D0 BC  .............q..
   0150: DC 65 A4 64 AE 75 D3 BE   43 98 38 71 AF 26 D1 5B  .e.d.u..C.8q.&.[
   0160: EC B4 E2 30 7A 36 C0 69   2E FC D8 54 C5 C7 86 AB  ...0z6.i...T....
   0170: E4 84 A6 A9 5D 50 5D 0A   5A CC 27 62 52 7D 1E 7F  ....]P].Z.'bR...
   0180: C4 EA A4 96 3E 28 91 02   BB 86 D8 97 E6 84 A2 18  ....>(..........
   0190: 8B 36 6B F1 0E F1 7F 3A   2B 93 F1 9C B2 83 62 D3  .6k....:+.....b.
   01A0: 98 24 41 ED 6B B5 75 7A   2D D8 74 30 5E 9F 75 FA  .$A.k.uz-.t0^.u.
   01B0: D2 3C 27 4F B3 C4 D8 B1   56 9F 0B 12 56 B5 DC 8A  .<'O....V...V...
   01C0: B9 E4 96 6B 74 1E 05 A8   03 97 5D 4C 2F 4F 91 A3  ...kt.....]L/O..
   01D0: 0B 50 61 D3 98 0F 40 F0   5A 0D 9B C3 CA 70 DA 3A  [email protected].:
   01E0: CC 03 DA 21 D0 68 24 67   63 AE C6 53 B3 C2 63 32  ...!.h$gc..S..c2
   01F0: 5D A0 6E FD D3 44 FA 75   7E B5 6C 77 04 DC 23 05  ].n..D.u..lw..#.
   0200: D4 02 4F A0 3F 08 DA EB   B1 EB 0A A7 86 FE 97 76  ..O.?..........v
   0210: 08                                                 .
   
   Found KeyTab 
/Users/kentyao/incubator-kyuubi/kyuubi-server/target/scala-2.12/test-classes/kyuubi-kdc-56ab1039-e2ee-4919-be62-09950f8a9436/kyuubi-test.keytab
 for client/[email protected]
   Found ticket for client/[email protected] to go to 
krbtgt/[email protected] expiring on Thu Jun 20 
10:40:54 CST 2024
   Entered Krb5Context.acceptSecContext with state=STATE_NEW
   Looking for keys for: client/[email protected]
   Added key: 16version: 1
   Added key: 17version: 1
   >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType
   Using builtin default etypes for permitted_enctypes
   default etypes for permitted_enctypes: 18 17 16 23.
   >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType
   MemoryCache: add 
1632451256/735901/950FAB11DE5DBEE5A294D0BC8AE2C51A/client/[email protected]
 to 
client/[email protected]|client/[email protected]
   >>> KrbApReq: authenticate succeed.
   Krb5Context setting peerSeqNumber to: 954773118
   >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType
   Krb5Context setting mySeqNumber to: 765865618
   Entered Krb5Context.initSecContext with state=STATE_IN_PROCESS
   >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType
   Krb5Context setting peerSeqNumber to: 765865618
   Krb5Context.wrap: data=[01 01 00 00 ]
   Krb5Context.wrap: token=[05 04 01 ff 00 0c 00 00 00 00 00 00 2d a6 2e 92 01 
01 00 00 80 c3 92 55 fb 89 0d 21 28 c7 5f 2d ]
   Krb5Context.unwrap: token=[05 04 01 ff 00 0c 00 00 00 00 00 00 2d a6 2e 92 
01 01 00 00 80 c3 92 55 fb 89 0d 21 28 c7 5f 2d ]
   Krb5Context.unwrap: data=[01 01 00 00 ]
   Krb5Context.wrap: data=[01 01 00 00 ]
   Krb5Context.wrap: token=[05 04 00 ff 00 0c 00 00 00 00 00 00 38 e8 ae 7e 01 
01 00 00 56 63 d4 57 f6 33 9b 63 94 ce 7f e3 ]
   Krb5Context.unwrap: token=[05 04 00 ff 00 0c 00 00 00 00 00 00 38 e8 ae 7e 
01 01 00 00 56 63 d4 57 f6 33 9b 63 94 ce 7f e3 ]
   Krb5Context.unwrap: data=[01 01 00 00 ]
   Found ticket for client/[email protected] to go to 
krbtgt/[email protected] expiring on Thu Jun 20 
10:40:54 CST 2024
   Entered Krb5Context.initSecContext with state=STATE_NEW
   Found ticket for client/[email protected] to go to 
krbtgt/[email protected] expiring on Thu Jun 20 
10:40:54 CST 2024
   Found ticket for client/[email protected] to go to 
client/[email protected] expiring on Thu Jun 20 10:40:56 CST 
2024
   Found service ticket in the subjectTicket (hex) =
   0000: 61 82 01 12 30 82 01 0E   A0 03 02 01 05 A1 1A 1B  a...0...........
   0010: 18 4B 45 52 42 45 52 49   5A 45 44 54 45 53 54 48  .KERBERIZEDTESTH
   0020: 45 4C 50 45 52 2E 43 4F   4D A2 1E 30 1C A0 03 02  ELPER.COM..0....
   0030: 01 00 A1 15 30 13 1B 06   63 6C 69 65 6E 74 1B 09  ....0...client..
   0040: 6C 6F 63 61 6C 68 6F 73   74 A3 81 CA 30 81 C7 A0  localhost...0...
   0050: 03 02 01 11 A1 03 02 01   01 A2 81 BA 04 81 B7 0C  ................
   0060: 42 B8 BB FD 65 27 29 10   44 E1 37 9D C0 65 2C 1D  B...e').D.7..e,.
   0070: 97 1A A4 A9 91 F2 C4 CE   02 97 A2 F4 65 15 6A F7  ............e.j.
   0080: 79 01 7B 57 EE 67 75 64   47 D4 E6 BB 6A 00 69 16  y..W.gudG...j.i.
   0090: 62 AE 00 2E 11 88 F3 6E   17 6E 2F 37 C6 F7 64 7A  b......n.n/7..dz
   00A0: 80 F7 8E A4 EA 9E BD AE   58 D4 F4 5C 0B A2 39 8C  ........X..\..9.
   00B0: B0 B6 A5 D3 2E EB F2 2C   E5 A4 E2 52 9F 0C F8 F7  .......,...R....
   00C0: 3F 48 A5 59 5C ED B7 37   AF E5 E5 E5 36 96 B9 20  ?H.Y\..7....6..
   00D0: 70 0F 6C DE 47 67 23 94   5C FF 99 EE 50 40 90 56  p.l.Gg#.\[email protected]
   00E0: B7 CA 54 ED 9E 0E 07 97   C5 EE 80 D5 28 2B CD FE  ..T.........(+..
   00F0: A2 31 F2 28 DE 71 6B E6   B7 99 E0 66 45 6C 00 69  .1.(.qk....fEl.i
   0100: 48 51 B1 74 BF 0C 74 48   EA 76 C5 30 27 39 D4 56  HQ.t..tH.v.0'9.V
   0110: 45 9F 03 F0 35 C4                                  E...5.
   
   Client Principal = client/[email protected]
   Server Principal = client/[email protected]
   Session Key = EncryptionKey: keyType=17 keyBytes (hex dump)=
   0000: 4F 14 BD EC 31 C6 85 B6   AA 00 78 63 36 B8 40 D1  O...1.....xc6.@.
   ```
   
   we shall suppress these noises
   
   ### Affects Version(s)
   
   1.4.0
   
   ### Kyuubi Server Log Output
   
   _No response_
   
   ### Kyuubi Engine Log Output
   
   _No response_
   
   ### Kyuubi Server Configurations
   
   _No response_
   
   ### Kyuubi Engine Configurations
   
   _No response_
   
   ### Additional context
   
   _No response_
   
   ### Are you willing to submit PR?
   
   - [ ] Yes I am willing to submit a PR!


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]


Reply via email to