On 03/18/2014 10:10 AM, Jan Pazdziora wrote:
On Tue, Mar 18, 2014 at 09:02:13AM +0100, Marco Di Sabatino Di Diodoro wrote:
what are the requirements or packages that a client must have to call JSON/RPC 
with java? We have a 401 error.
What packages / code do you attempt to use when you get that 401?


Hi guys, first of all thanks for your replies.

Summarizing...

1) On FreeIPA server I created a keytab executing following commands:
        *) ipa host-add ebano.example.com
        *) ipa service-add HTTP/ebano.example.com
*) ipa-getkeytab -s olmo.example.com -p HTTP/ebano.example.com -k /tmp/ebano.keytab
        *) scp /tmp/ebano.keytab root@ebano:/var/tmp

2) On ebano (the client machine) I have a Java client based on HttpClient 3.1 that uses this java.security.auth.login.config file:
#########################################
un.security.jgss.login {
    com.sun.security.auth.module.Krb5LoginModule required
    client=TRUE
    refreshKrb5Config=true
    useKeyTab=true
    keyTab="/var/tmp/ebano.keytab"
    principal="HTTP/ebano.example.com";
};

com.sun.security.jgss.initiate {
    com.sun.security.auth.module.Krb5LoginModule required
    client=TRUE
    refreshKrb5Config=true
    useKeyTab=true
    keyTab="/var/tmp/ebano.keytab"
    principal="HTTP/ebano.example.com";

};

com.sun.security.jgss.accept {
    com.sun.security.auth.module.Krb5LoginModule required
    client=TRUE
    refreshKrb5Config=true
    useKeyTab=true
    keyTab="/var/tmp/ebano.keytab"
    principal="HTTP/ebano.example.com";
};
#########################################

As you can see in attached log file, I can negotiate authentication on FreeIPA server and final response from it is a 401

10:16:36.407 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "{" 10:16:36.407 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "[\n]" 10:16:36.407 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << " "error": {[\n]" 10:16:36.407 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << " "code": 1101, [\n]" 10:16:36.408 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << " "message": "did not receive Kerberos credentials", [\n]" 10:16:36.408 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << " "name": {[\n]" 10:16:36.408 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << " "__base64__": "Q0NhY2hlRXJyb3I="[\n]" 10:16:36.408 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << " }[\n]" 10:16:36.408 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << " }, [\n]" 10:16:36.408 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << " "id": null, [\n]" 10:16:36.408 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << " "principal": "UNKNOWN", [\n]" 10:16:36.408 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << " "result": null, [\n]" 10:16:36.408 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << " "version": "3.3.4"[\n]" 10:16:36.408 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "}"

But...

Reading Kerberos server log I noticed that a right curl based call generates a mar 18 08:20:12 olmo.example.com krb5kdc[1423](info): TGS_REQ (1 etypes {18}) 192.168.0.105: ISSUE: authtime 1395072185, etypes {rep=18 tkt=18 ses=18}, ad...@example.com for krbtgt/example....@example.com mar 18 08:20:13 olmo.example.com krb5kdc[1423](info): TGS_REQ (6 etypes {18 17 16 23 25 26}) 192.168.0.106: ISSUE: authtime 1395072185, etypes {rep=18 tkt=18 ses=18}, ad...@example.com for ldap/olmo.example....@example.com

whereas Java client generates a

mar 17 19:48:21 olmo.example.com krb5kdc[1423](info): AS_REQ (4 etypes {18 17 16 23}) 192.168.0.105: NEEDED_PREAUTH: HTTP/ebano.example....@example.com for krbtgt/example....@example.com, Additional pre-authentication required mar 17 19:48:21 olmo.example.com krb5kdc[1423](info): AS_REQ (4 etypes {18 17 16 23}) 192.168.0.105: ISSUE: authtime 1395082101, etypes {rep=18 tkt=18 ses=18}, HTTP/ebano.example....@example.com for krbtgt/example....@example.com mar 17 19:48:21 olmo.example.com krb5kdc[1423](info): TGS_REQ (6 etypes {18 17 16 23 1 3}) 192.168.0.105: ISSUE: authtime 1395082101, etypes {rep=18 tkt=18 ses=18}, HTTP/ebano.example....@example.com for HTTP/olmo.example....@example.com

The difference between the two calls is on the last TGS_REQ; because the first one is on ldap/olmo.example....@example.com and it's OK whereas the second one is on HTTP/olmo.example....@example.com that returns a 401 (I suppose).

Where's the error?

Thanks for your help.

--
Massimiliano Perrone
Tel +39 393 9121310

Tirasa S.r.l.
Viale D'Annunzio 267 - 65127 Pescara
Tel +39 0859116307 / FAX +39 0859111173
http://www.example.com

Apache Syncope PMC Member
http://people.apache.org/~massi/

"L'apprendere molte cose non insegna l'intelligenza"
(Eraclito)

10:16:35.841 [net.tirasa.freeipa.FreeIPA.main()] DEBUG o.a.h.i.c.PoolingClientConnectionManager - Connection request: [route: {s}->https://olmo.tirasa.net][total kept alive: 0; route allocated: 0 of 2; total allocated: 0 of 20]
10:16:35.948 [net.tirasa.freeipa.FreeIPA.main()] DEBUG o.a.h.i.c.PoolingClientConnectionManager - Connection leased: [id: 0][route: {s}->https://olmo.tirasa.net][total kept alive: 0; route allocated: 1 of 2; total allocated: 1 of 20]
10:16:36.017 [net.tirasa.freeipa.FreeIPA.main()] DEBUG o.a.h.i.c.DefaultClientConnectionOperator - Connecting to olmo.tirasa.net:443
10:16:36.162 [net.tirasa.freeipa.FreeIPA.main()] DEBUG o.a.h.c.protocol.RequestAddCookies - CookieSpec selected: best-match
10:16:36.171 [net.tirasa.freeipa.FreeIPA.main()] DEBUG o.a.h.c.protocol.RequestAuthCache - Auth cache not set in the context
10:16:36.171 [net.tirasa.freeipa.FreeIPA.main()] DEBUG o.a.h.c.p.RequestTargetAuthentication - Target auth state: UNCHALLENGED
10:16:36.172 [net.tirasa.freeipa.FreeIPA.main()] DEBUG o.a.h.c.p.RequestProxyAuthentication - Proxy auth state: UNCHALLENGED
10:16:36.172 [net.tirasa.freeipa.FreeIPA.main()] DEBUG o.a.h.impl.client.DefaultHttpClient - Attempt 1 to execute request
10:16:36.173 [net.tirasa.freeipa.FreeIPA.main()] DEBUG o.a.h.i.conn.DefaultClientConnection - Sending request: POST /ipa/json HTTP/1.1
10:16:36.173 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - >> "POST /ipa/json HTTP/1.1[\r][\n]"
10:16:36.174 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - >> "referer: https://olmo.tirasa.net/ipa[\r][\n]";
10:16:36.174 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - >> "Content-Type: application/json[\r][\n]"
10:16:36.174 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - >> "Accept: application/json[\r][\n]"
10:16:36.175 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - >> "Content-Length: 20[\r][\n]"
10:16:36.175 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - >> "Host: olmo.tirasa.net[\r][\n]"
10:16:36.175 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - >> "Connection: Keep-Alive[\r][\n]"
10:16:36.175 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - >> "User-Agent: Apache-HttpClient/4.2.5 (java 1.5)[\r][\n]"
10:16:36.175 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - >> "[\r][\n]"
10:16:36.175 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.headers - >> POST /ipa/json HTTP/1.1
10:16:36.175 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.headers - >> referer: https://olmo.tirasa.net/ipa
10:16:36.175 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.headers - >> Content-Type: application/json
10:16:36.175 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.headers - >> Accept: application/json
10:16:36.175 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.headers - >> Content-Length: 20
10:16:36.175 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.headers - >> Host: olmo.tirasa.net
10:16:36.176 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.headers - >> Connection: Keep-Alive
10:16:36.176 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.headers - >> User-Agent: Apache-HttpClient/4.2.5 (java 1.5)
10:16:36.176 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - >> "method=get_all_users"
10:16:36.178 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "HTTP/1.1 401 Unauthorized[\r][\n]"
10:16:36.180 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "Date: Tue, 18 Mar 2014 09:15:11 GMT[\r][\n]"
10:16:36.180 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "Server: Apache/2.4.7 (Fedora) mod_auth_kerb/5.4 mod_nss/2.4.6 NSS/3.15.3 Basic ECC mod_wsgi/3.4 Python/2.7.5[\r][\n]"
10:16:36.180 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "WWW-Authenticate: Negotiate[\r][\n]"
10:16:36.181 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "Last-Modified: Tue, 28 Jan 2014 08:12:54 GMT[\r][\n]"
10:16:36.181 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "Accept-Ranges: bytes[\r][\n]"
10:16:36.181 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "Content-Length: 1383[\r][\n]"
10:16:36.181 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "Keep-Alive: timeout=5, max=100[\r][\n]"
10:16:36.181 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "Connection: Keep-Alive[\r][\n]"
10:16:36.182 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "Content-Type: text/html; charset=UTF-8[\r][\n]"
10:16:36.182 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "[\r][\n]"
10:16:36.182 [net.tirasa.freeipa.FreeIPA.main()] DEBUG o.a.h.i.conn.DefaultClientConnection - Receiving response: HTTP/1.1 401 Unauthorized
10:16:36.182 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.headers - << HTTP/1.1 401 Unauthorized
10:16:36.183 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.headers - << Date: Tue, 18 Mar 2014 09:15:11 GMT
10:16:36.183 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.headers - << Server: Apache/2.4.7 (Fedora) mod_auth_kerb/5.4 mod_nss/2.4.6 NSS/3.15.3 Basic ECC mod_wsgi/3.4 Python/2.7.5
10:16:36.183 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.headers - << WWW-Authenticate: Negotiate
10:16:36.183 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.headers - << Last-Modified: Tue, 28 Jan 2014 08:12:54 GMT
10:16:36.183 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.headers - << Accept-Ranges: bytes
10:16:36.183 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.headers - << Content-Length: 1383
10:16:36.183 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.headers - << Keep-Alive: timeout=5, max=100
10:16:36.183 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.headers - << Connection: Keep-Alive
10:16:36.183 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.headers - << Content-Type: text/html; charset=UTF-8
10:16:36.188 [net.tirasa.freeipa.FreeIPA.main()] DEBUG o.a.h.impl.client.DefaultHttpClient - Connection can be kept alive for 5000 MILLISECONDS
10:16:36.188 [net.tirasa.freeipa.FreeIPA.main()] DEBUG o.a.h.impl.client.DefaultHttpClient - Authentication required
10:16:36.188 [net.tirasa.freeipa.FreeIPA.main()] DEBUG o.a.h.impl.client.DefaultHttpClient - olmo.tirasa.net:443 requested authentication
10:16:36.190 [net.tirasa.freeipa.FreeIPA.main()] DEBUG o.a.h.i.c.TargetAuthenticationStrategy - Authentication schemes in the order of preference: [negotiate, Kerberos, NTLM, Digest, Basic]
10:16:36.200 [net.tirasa.freeipa.FreeIPA.main()] DEBUG o.apache.http.impl.auth.SPNegoScheme - Received challenge '' from the auth server
10:16:36.201 [net.tirasa.freeipa.FreeIPA.main()] DEBUG o.a.h.i.c.TargetAuthenticationStrategy - Challenge for Kerberos authentication scheme not available
10:16:36.201 [net.tirasa.freeipa.FreeIPA.main()] DEBUG o.a.h.i.c.TargetAuthenticationStrategy - Challenge for NTLM authentication scheme not available
10:16:36.201 [net.tirasa.freeipa.FreeIPA.main()] DEBUG o.a.h.i.c.TargetAuthenticationStrategy - Challenge for Digest authentication scheme not available
10:16:36.201 [net.tirasa.freeipa.FreeIPA.main()] DEBUG o.a.h.i.c.TargetAuthenticationStrategy - Challenge for Basic authentication scheme not available
10:16:36.202 [net.tirasa.freeipa.FreeIPA.main()] DEBUG o.a.h.impl.client.DefaultHttpClient - Selected authentication options: [NEGOTIATE]
10:16:36.203 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "<"
10:16:36.204 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "!DOCTYPE html>[\n]"
10:16:36.204 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "<html>[\n]"
10:16:36.205 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "<head>[\n]"
10:16:36.205 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "    <meta charset="utf-8">[\n]"
10:16:36.205 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "    <title>IPA: Identity Policy Audit</title>[\n]"
10:16:36.205 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "[\n]"
10:16:36.205 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "    <script type="text/javascript" src="../ui/js/libs/jquery.js"></script>[\n]"
10:16:36.205 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "[\n]"
10:16:36.205 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "    <link rel="stylesheet" type="text/css" href="../ui/jquery-ui.css" />[\n]"
10:16:36.205 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "    <link rel="stylesheet" type="text/css" href="../ui/ipa.css" />[\n]"
10:16:36.205 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "    <link rel="stylesheet" type="text/css" href="ipa_error.css" />[\n]"
10:16:36.205 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "</head>[\n]"
10:16:36.206 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "[\n]"
10:16:36.206 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "<body class="info-page">[\n]"
10:16:36.206 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "[\n]"
10:16:36.206 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "    <div class="container_1">[\n]"
10:16:36.206 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "[\n]"
10:16:36.206 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "        <div class="header-logo">[\n]"
10:16:36.206 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "            <img src="../ui/images/ipa-logo.png" /><img src="../ui/images/ipa-banner.png" />[\n]"
10:16:36.206 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "        </div>[\n]"
10:16:36.206 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "[\n]"
10:16:36.206 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "        <div class="textblockkrb">[\n]"
10:16:36.206 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "            <h1>Unable to verify your Kerberos credentials</h1>[\n]"
10:16:36.207 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "            <p>[\n]"
10:16:36.207 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "                Please make sure that you have valid Kerberos tickets (obtainable via <strong>kinit</strong>),[\n]"
10:16:36.207 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "                and that you have configured your browser correctly.[\n]"
10:16:36.207 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "            </p>[\n]"
10:16:36.207 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "[\n]"
10:16:36.207 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "            <h2> Browser configuration</h2>[\n]"
10:16:36.207 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "[\n]"
10:16:36.207 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "            <div id="first-time">[\n]"
10:16:36.207 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "                <p>[\n]"
10:16:36.207 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "                    If this is your first time, please <strong>configure your browser</strong>.[\n]"
10:16:36.208 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "                    Use <a href="browserconfig.html">Firefox configuration page</a> for Firefox[\n]"
10:16:36.208 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "                    or <a href="ssbrowser.html">manual configuration page</a> for other browsers.[\n]"
10:16:36.208 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "                </p>[\n]"
10:16:36.208 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "            </div>[\n]"
10:16:36.208 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "        </div>[\n]"
10:16:36.208 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "[\n]"
10:16:36.208 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "    </div>[\n]"
10:16:36.208 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "[\n]"
10:16:36.208 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "</body>[\n]"
10:16:36.208 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "[\n]"
10:16:36.209 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "</html>[\n]"
10:16:36.209 [net.tirasa.freeipa.FreeIPA.main()] DEBUG o.a.h.c.protocol.RequestAddCookies - CookieSpec selected: best-match
10:16:36.210 [net.tirasa.freeipa.FreeIPA.main()] DEBUG o.a.h.c.protocol.RequestAuthCache - Auth cache not set in the context
10:16:36.210 [net.tirasa.freeipa.FreeIPA.main()] DEBUG o.a.h.c.p.RequestTargetAuthentication - Target auth state: CHALLENGED
10:16:36.210 [net.tirasa.freeipa.FreeIPA.main()] DEBUG o.a.h.c.p.RequestTargetAuthentication - Generating response to an authentication challenge using Negotiate scheme
10:16:36.210 [net.tirasa.freeipa.FreeIPA.main()] DEBUG o.apache.http.impl.auth.SPNegoScheme - init olmo.tirasa.net
Java config name: null
Native config name: /etc/krb5.conf
Loaded from native config
Java config name: null
Native config name: /etc/krb5.conf
Loaded from native config
>>> KdcAccessibility: reset
>>> KdcAccessibility: reset
>>> KeyTabInputStream, readName(): TIRASA.NET
>>> KeyTabInputStream, readName(): HTTP
>>> KeyTabInputStream, readName(): ebano.tirasa.net
>>> KeyTab: load() entry length: 83; type: 18
>>> KeyTabInputStream, readName(): TIRASA.NET
>>> KeyTabInputStream, readName(): HTTP
>>> KeyTabInputStream, readName(): ebano.tirasa.net
>>> KeyTab: load() entry length: 67; type: 17
>>> KeyTabInputStream, readName(): TIRASA.NET
>>> KeyTabInputStream, readName(): HTTP
>>> KeyTabInputStream, readName(): ebano.tirasa.net
>>> KeyTab: load() entry length: 75; type: 16
>>> KeyTabInputStream, readName(): TIRASA.NET
>>> KeyTabInputStream, readName(): HTTP
>>> KeyTabInputStream, readName(): ebano.tirasa.net
>>> KeyTab: load() entry length: 67; type: 23
>>> KeyTabInputStream, readName(): TIRASA.NET
>>> KeyTabInputStream, readName(): HTTP
>>> KeyTabInputStream, readName(): ebano.tirasa.net
>>> KeyTab: load() entry length: 67; type: 25
>>> KeyTabInputStream, readName(): TIRASA.NET
>>> KeyTabInputStream, readName(): HTTP
>>> KeyTabInputStream, readName(): ebano.tirasa.net
>>> KeyTab: load() entry length: 83; type: 26
Found unsupported keytype (26) for HTTP/ebano.tirasa....@tirasa.net
Found unsupported keytype (25) for HTTP/ebano.tirasa....@tirasa.net
Added key: 23version: 1
Added key: 16version: 1
Added key: 17version: 1
Added key: 18version: 1
Ordering keys wrt default_tkt_enctypes list
Using builtin default etypes for default_tkt_enctypes
default etypes for default_tkt_enctypes: 18 17 16 23 1 3.
Found unsupported keytype (26) for HTTP/ebano.tirasa....@tirasa.net
Found unsupported keytype (25) for HTTP/ebano.tirasa....@tirasa.net
Added key: 23version: 1
Added key: 16version: 1
Added key: 17version: 1
Added key: 18version: 1
Ordering keys wrt default_tkt_enctypes list
Using builtin default etypes for default_tkt_enctypes
default etypes for default_tkt_enctypes: 18 17 16 23 1 3.
Using builtin default etypes for default_tkt_enctypes
default etypes for default_tkt_enctypes: 18 17 16 23 1 3.
>>> KrbAsReq creating message
>>> KrbKdcReq send: kdc=olmo.tirasa.net UDP:88, timeout=30000, number of retries =3, #bytes=158
>>> KDCCommunication: kdc=olmo.tirasa.net UDP:88, timeout=30000,Attempt =1, #bytes=158
>>> KrbKdcReq send: #bytes read=412
>>>Pre-Authentication Data:
	 PA-DATA type = 136

>>>Pre-Authentication Data:
	 PA-DATA type = 19
	 PA-ETYPE-INFO2 etype = 18, salt = TIRASA.NETHTTPebano.tirasa.net, s2kparams = null
	 PA-ETYPE-INFO2 etype = 17, salt = TIRASA.NETHTTPebano.tirasa.net, s2kparams = null
	 PA-ETYPE-INFO2 etype = 16, salt = TIRASA.NETHTTPebano.tirasa.net, s2kparams = null
	 PA-ETYPE-INFO2 etype = 23, salt = TIRASA.NETHTTPebano.tirasa.net, s2kparams = null

>>>Pre-Authentication Data:
	 PA-DATA type = 2
	 PA-ENC-TIMESTAMP
>>>Pre-Authentication Data:
	 PA-DATA type = 133

>>> KdcAccessibility: remove olmo.tirasa.net:88
>>> KDCRep: init() encoding tag is 126 req type is 11
>>>KRBError:
	 cTime is Tue Oct 29 23:38:04 CET 2013 1383086284000
	 sTime is Tue Mar 18 10:15:11 CET 2014 1395134111000
	 suSec is 466349
	 error code is 25
	 error Message is Additional pre-authentication required
	 crealm is TIRASA.NET
	 cname is HTTP/ebano.tirasa.net
	 realm is TIRASA.NET
	 sname is krbtgt/TIRASA.NET
	 eData provided.
	 msgType is 30
>>>Pre-Authentication Data:
	 PA-DATA type = 136

>>>Pre-Authentication Data:
	 PA-DATA type = 19
	 PA-ETYPE-INFO2 etype = 18, salt = TIRASA.NETHTTPebano.tirasa.net, s2kparams = null
	 PA-ETYPE-INFO2 etype = 17, salt = TIRASA.NETHTTPebano.tirasa.net, s2kparams = null
	 PA-ETYPE-INFO2 etype = 16, salt = TIRASA.NETHTTPebano.tirasa.net, s2kparams = null
	 PA-ETYPE-INFO2 etype = 23, salt = TIRASA.NETHTTPebano.tirasa.net, s2kparams = null

>>>Pre-Authentication Data:
	 PA-DATA type = 2
	 PA-ENC-TIMESTAMP
>>>Pre-Authentication Data:
	 PA-DATA type = 133

KRBError received: NEEDED_PREAUTH
KrbAsReqBuilder: PREAUTH FAILED/REQ, re-send AS-REQ
Using builtin default etypes for default_tkt_enctypes
default etypes for default_tkt_enctypes: 18 17 16 23 1 3.
Found unsupported keytype (26) for HTTP/ebano.tirasa....@tirasa.net
Found unsupported keytype (25) for HTTP/ebano.tirasa....@tirasa.net
Added key: 23version: 1
Added key: 16version: 1
Added key: 17version: 1
Added key: 18version: 1
Ordering keys wrt default_tkt_enctypes list
Using builtin default etypes for default_tkt_enctypes
default etypes for default_tkt_enctypes: 18 17 16 23 1 3.
Found unsupported keytype (26) for HTTP/ebano.tirasa....@tirasa.net
Found unsupported keytype (25) for HTTP/ebano.tirasa....@tirasa.net
Added key: 23version: 1
Added key: 16version: 1
Added key: 17version: 1
Added key: 18version: 1
Ordering keys wrt default_tkt_enctypes list
Using builtin default etypes for default_tkt_enctypes
default etypes for default_tkt_enctypes: 18 17 16 23 1 3.
Using builtin default etypes for default_tkt_enctypes
default etypes for default_tkt_enctypes: 18 17 16 23 1 3.
>>> EType: sun.security.krb5.internal.crypto.Aes256CtsHmacSha1EType
>>> KrbAsReq creating message
>>> KrbKdcReq send: kdc=olmo.tirasa.net UDP:88, timeout=30000, number of retries =3, #bytes=245
>>> KDCCommunication: kdc=olmo.tirasa.net UDP:88, timeout=30000,Attempt =1, #bytes=245
>>> KrbKdcReq send: #bytes read=694
>>> KdcAccessibility: remove olmo.tirasa.net:88
Found unsupported keytype (26) for HTTP/ebano.tirasa....@tirasa.net
Found unsupported keytype (25) for HTTP/ebano.tirasa....@tirasa.net
Added key: 23version: 1
Added key: 16version: 1
Added key: 17version: 1
Added key: 18version: 1
Ordering keys wrt default_tkt_enctypes list
Using builtin default etypes for default_tkt_enctypes
default etypes for default_tkt_enctypes: 18 17 16 23 1 3.
>>> EType: sun.security.krb5.internal.crypto.Aes256CtsHmacSha1EType
>>> KrbAsRep cons in KrbAsReq.getReply HTTP/ebano.tirasa.net
Found ticket for HTTP/ebano.tirasa....@tirasa.net to go to krbtgt/tirasa....@tirasa.net expiring on Wed Mar 19 10:15:11 CET 2014
Entered Krb5Context.initSecContext with state=STATE_NEW
Service ticket not found in the subject
>>> Credentials acquireServiceCreds: same realm
Using builtin default etypes for default_tgs_enctypes
default etypes for default_tgs_enctypes: 18 17 16 23 1 3.
>>> CksumType: sun.security.krb5.internal.crypto.RsaMd5CksumType
>>> EType: sun.security.krb5.internal.crypto.Aes256CtsHmacSha1EType
>>> KrbKdcReq send: kdc=olmo.tirasa.net UDP:88, timeout=30000, number of retries =3, #bytes=681
>>> KDCCommunication: kdc=olmo.tirasa.net UDP:88, timeout=30000,Attempt =1, #bytes=681
>>> KrbKdcReq send: #bytes read=642
>>> KdcAccessibility: remove olmo.tirasa.net:88
>>> EType: sun.security.krb5.internal.crypto.Aes256CtsHmacSha1EType
>>> KrbApReq: APOptions are 00100000 00000000 00000000 00000000
>>> EType: sun.security.krb5.internal.crypto.Aes256CtsHmacSha1EType
Krb5Context setting mySeqNumber to: 805599889
Created InitSecContextToken:
0000: 01 00 6E 82 02 4E 30 82   02 4A A0 03 02 01 05 A1  ..n..N0..J......
0010: 03 02 01 0E A2 07 03 05   00 20 00 00 00 A3 82 01  ......... ......
0020: 52 61 82 01 4E 30 82 01   4A A0 03 02 01 05 A1 0C  Ra..N0..J.......
0030: 1B 0A 54 49 52 41 53 41   2E 4E 45 54 A2 22 30 20  ..TIRASA.NET."0 
0040: A0 03 02 01 01 A1 19 30   17 1B 04 48 54 54 50 1B  .......0...HTTP.
0050: 0F 6F 6C 6D 6F 2E 74 69   72 61 73 61 2E 6E 65 74  .olmo.tirasa.net
0060: A3 82 01 0F 30 82 01 0B   A0 03 02 01 12 A1 03 02  ....0...........
0070: 01 02 A2 81 FE 04 81 FB   46 17 6A F0 3F 90 99 01  ........F.j.?...
0080: C4 6F E9 C1 54 FC 90 DD   FB 70 F3 16 5B E2 5D FC  .o..T....p..[.].
0090: 5E 0D 74 77 00 3D 42 BD   4E 88 33 33 E0 0C AC F2  ^.tw.=B.N.33....
00A0: 97 DA 6F 95 32 B2 FE BB   6D 52 0A 67 27 2A 25 0F  ..o.2...mR.g'*%.
00B0: 13 3D ED 13 A8 CE BA 4A   78 19 92 39 C4 F3 FB B0  .=.....Jx..9....
00C0: 43 D6 3A 5D 0C 11 E7 D0   4D EF 52 82 80 FE E7 4A  C.:]....M.R....J
00D0: 1C 65 81 6D 8F 4A 14 1D   9C 87 43 4F 59 5D CE 46  .e.m.J....COY].F
00E0: 64 94 2E 99 E1 46 3B 20   A5 ED 99 0E E5 FD 3A 04  d....F; ......:.
00F0: 0F 9C D0 62 DF D4 C1 5F   41 75 13 5F 3A 81 C4 E9  ...b..._Au._:...
0100: 6C 5A 48 A1 F0 F4 92 62   1F 4C 94 4A B0 33 E7 BF  lZH....b.L.J.3..
0110: AE C0 90 0F BE 10 51 DC   BC 66 5C 2E AB F8 30 B2  ......Q..f\...0.
0120: 78 84 3D 6A 94 7C B0 CC   E9 F9 DE 71 10 1C 7D D1  x.=j.......q....
0130: 77 4F 03 EC 45 D0 5E A6   01 53 05 89 33 09 2A 8C  wO..E.^..S..3.*.
0140: 49 26 7E D1 D8 15 A1 B1   04 D1 E6 BE 10 89 31 AB  I&............1.
0150: FD BC E8 71 E4 60 E2 87   22 5F BE 33 ED A0 9D 64  ...q.`.."_.3...d
0160: D7 EC BC 34 75 EF E2 CE   19 7A 48 BE 47 3D 16 7F  ...4u....zH.G=..
0170: 44 7F 35 A4 81 DE 30 81   DB A0 03 02 01 12 A2 81  D.5...0.........
0180: D3 04 81 D0 69 3B AD 35   4C 00 7A 05 92 50 B1 0B  ....i;.5L.z..P..
0190: 9A 6B BE F9 3E 8A 93 21   33 A5 D9 A1 10 FE D5 73  .k..>..!3......s
01A0: 3C 9C 8F 3A 2C 3B 7C F1   25 81 DE F5 10 B4 62 97  <..:,;..%.....b.
01B0: 34 37 41 FB FF 32 EB AA   2A BB 74 57 78 72 C0 2F  47A..2..*.tWxr./
01C0: 5D 6C B6 56 CD ED A7 88   B3 6B 72 A7 AC 6B 74 21  ]l.V.....kr..kt!
01D0: 3A 92 04 8E 02 79 FD 73   08 AF 98 CE E0 38 AC 7A  :....y.s.....8.z
01E0: 26 F0 6E 8F 8C EA E8 58   54 94 DB F8 09 B3 71 11  &.n....XT.....q.
01F0: 4C B8 D6 2E BC 48 87 20   EC CF 9F CF DA 6B 8D FB  L....H. .....k..
0200: 1F D4 B2 94 AD 36 6F CE   5B FD 61 0B 50 15 90 8A  .....6o.[.a.P...
0210: 52 C2 2C C2 24 0E D5 6B   CE 61 D0 26 46 9A 7E 7C  R.,.$..k.a.&F...
0220: 46 90 2F 62 77 AE FF AB   60 4E 0A D1 19 5C 04 35  F./bw...`N...\.5
0230: DD 9B 6B A5 96 BB 7D BD   97 B7 9E 74 08 1A EA BC  ..k........t....
0240: 67 1F 6B 12 69 EB 50 80   3C C0 97 9C 17 E7 B6 94  g.k.i.P.<.......
0250: 13 F6 93 14                                        ....

10:16:36.376 [net.tirasa.freeipa.FreeIPA.main()] DEBUG o.apache.http.impl.auth.SPNegoScheme - Sending response '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' back to the auth server
10:16:36.376 [net.tirasa.freeipa.FreeIPA.main()] DEBUG o.a.h.c.p.RequestProxyAuthentication - Proxy auth state: UNCHALLENGED
10:16:36.377 [net.tirasa.freeipa.FreeIPA.main()] DEBUG o.a.h.impl.client.DefaultHttpClient - Attempt 2 to execute request
10:16:36.377 [net.tirasa.freeipa.FreeIPA.main()] DEBUG o.a.h.i.conn.DefaultClientConnection - Sending request: POST /ipa/json HTTP/1.1
10:16:36.377 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - >> "POST /ipa/json HTTP/1.1[\r][\n]"
10:16:36.377 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - >> "referer: https://olmo.tirasa.net/ipa[\r][\n]";
10:16:36.378 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - >> "Content-Type: application/json[\r][\n]"
10:16:36.378 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - >> "Accept: application/json[\r][\n]"
10:16:36.379 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - >> "Content-Length: 20[\r][\n]"
10:16:36.379 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - >> "Host: olmo.tirasa.net[\r][\n]"
10:16:36.379 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - >> "Connection: Keep-Alive[\r][\n]"
10:16:36.379 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - >> "User-Agent: Apache-HttpClient/4.2.5 (java 1.5)[\r][\n]"
10:16:36.379 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - >> "Authorization: Negotiate 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[\r][\n]"
10:16:36.380 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - >> "[\r][\n]"
10:16:36.380 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.headers - >> POST /ipa/json HTTP/1.1
10:16:36.380 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.headers - >> referer: https://olmo.tirasa.net/ipa
10:16:36.380 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.headers - >> Content-Type: application/json
10:16:36.380 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.headers - >> Accept: application/json
10:16:36.381 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.headers - >> Content-Length: 20
10:16:36.381 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.headers - >> Host: olmo.tirasa.net
10:16:36.381 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.headers - >> Connection: Keep-Alive
10:16:36.381 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.headers - >> User-Agent: Apache-HttpClient/4.2.5 (java 1.5)
10:16:36.381 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.headers - >> Authorization: Negotiate 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
10:16:36.381 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - >> "method=get_all_users"
10:16:36.397 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "HTTP/1.1 500 Internal Server Error[\r][\n]"
10:16:36.398 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "Date: Tue, 18 Mar 2014 09:15:11 GMT[\r][\n]"
10:16:36.398 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "Server: Apache/2.4.7 (Fedora) mod_auth_kerb/5.4 mod_nss/2.4.6 NSS/3.15.3 Basic ECC mod_wsgi/3.4 Python/2.7.5[\r][\n]"
10:16:36.399 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "WWW-Authenticate: Negotiate oYG3MIG0oAMKAQChCwYJKoZIhvcSAQICooGfBIGcYIGZBgkqhkiG9xIBAgICAG+BiTCBhqADAgEFoQMCAQ+iejB4oAMCARKicQRvALoREnfhfs8m4ye+OIipXPM0lfSmWduoqbXtGXCbSEy9RZJj+/IpNCM/gSd4icz4Fc+FUCHwcBfqf2dBAbMhhtE3sMXH3SDSzBOHGydgZzpCmyJORB1/z6iq383iaIktWmq/wEXaIDppxehRTy69[\r][\n]"
10:16:36.400 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "Content-Length: 272[\r][\n]"
10:16:36.400 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "Connection: close[\r][\n]"
10:16:36.401 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "Content-Type: text/html; charset=utf-8[\r][\n]"
10:16:36.402 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "[\r][\n]"
10:16:36.402 [net.tirasa.freeipa.FreeIPA.main()] DEBUG o.a.h.i.conn.DefaultClientConnection - Receiving response: HTTP/1.1 500 Internal Server Error
10:16:36.403 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.headers - << HTTP/1.1 500 Internal Server Error
10:16:36.403 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.headers - << Date: Tue, 18 Mar 2014 09:15:11 GMT
10:16:36.403 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.headers - << Server: Apache/2.4.7 (Fedora) mod_auth_kerb/5.4 mod_nss/2.4.6 NSS/3.15.3 Basic ECC mod_wsgi/3.4 Python/2.7.5
10:16:36.403 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.headers - << WWW-Authenticate: Negotiate oYG3MIG0oAMKAQChCwYJKoZIhvcSAQICooGfBIGcYIGZBgkqhkiG9xIBAgICAG+BiTCBhqADAgEFoQMCAQ+iejB4oAMCARKicQRvALoREnfhfs8m4ye+OIipXPM0lfSmWduoqbXtGXCbSEy9RZJj+/IpNCM/gSd4icz4Fc+FUCHwcBfqf2dBAbMhhtE3sMXH3SDSzBOHGydgZzpCmyJORB1/z6iq383iaIktWmq/wEXaIDppxehRTy69
10:16:36.403 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.headers - << Content-Length: 272
10:16:36.404 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.headers - << Connection: close
10:16:36.404 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.headers - << Content-Type: text/html; charset=utf-8
10:16:36.404 [net.tirasa.freeipa.FreeIPA.main()] DEBUG o.a.h.impl.client.DefaultHttpClient - Authentication succeeded
----------------------------------------
HTTP/1.1 500 Internal Server Error
----------------------------------------
10:16:36.407 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "{"
10:16:36.407 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "[\n]"
10:16:36.407 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "    "error": {[\n]"
10:16:36.407 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "        "code": 1101, [\n]"
10:16:36.408 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "        "message": "did not receive Kerberos credentials", [\n]"
10:16:36.408 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "        "name": {[\n]"
10:16:36.408 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "            "__base64__": "Q0NhY2hlRXJyb3I="[\n]"
10:16:36.408 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "        }[\n]"
10:16:36.408 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "    }, [\n]"
10:16:36.408 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "    "id": null, [\n]"
10:16:36.408 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "    "principal": "UNKNOWN", [\n]"
10:16:36.408 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "    "result": null, [\n]"
10:16:36.408 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "    "version": "3.3.4"[\n]"
10:16:36.408 [net.tirasa.freeipa.FreeIPA.main()] DEBUG org.apache.http.wire - << "}"
10:16:36.410 [net.tirasa.freeipa.FreeIPA.main()] DEBUG o.a.h.i.conn.DefaultClientConnection - Connection 0.0.0.0:38865<->192.168.0.106:443 closed
10:16:36.410 [net.tirasa.freeipa.FreeIPA.main()] DEBUG o.a.h.i.c.PoolingClientConnectionManager - Connection released: [id: 0][route: {s}->https://olmo.tirasa.net][total kept alive: 0; route allocated: 0 of 2; total allocated: 0 of 20]
{
    "error": {
        "code": 1101, 
        "message": "did not receive Kerberos credentials", 
        "name": {
            "__base64__": "Q0NhY2hlRXJyb3I="
        }
    }, 
    "id": null, 
    "principal": "UNKNOWN", 
    "result": null, 
    "version": "3.3.4"
}

_______________________________________________
Freeipa-devel mailing list
Freeipa-devel@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-devel

Reply via email to