More info - attached var/log/secure, and sshd_config.

Password authentication works, just gssapi fails.  in the securecrt provided I 
have disabled password auth as an option


{\rtf1\ansi\ansicpg1252\cocoartf1187\cocoasubrtf340
{\fonttbl\f0\fswiss\fcharset0 Helvetica;}
{\colortbl;\red255\green255\blue255;}
\margl1440\margr1440\vieww10800\viewh8400\viewkind0
\pard\tx720\tx1440\tx2160\tx2880\tx3600\tx4320\tx5040\tx5760\tx6480\tx7200\tx7920\tx8640\pardirnatural

\f0\fs24 \cf0 # For this to work you will also need host keys in /etc/ssh/ssh_known_hosts\
#RhostsRSAAuthentication no\
# similar for protocol version 2\
#HostbasedAuthentication no\
# Change to yes if you don't trust ~/.ssh/known_hosts for\
# RhostsRSAAuthentication and HostbasedAuthentication\
#IgnoreUserKnownHosts no\
# Don't read the user's ~/.rhosts and ~/.shosts files\
#IgnoreRhosts yes\
\
# To disable tunneled clear text passwords, change to no here!\
#PasswordAuthentication yes\
#PermitEmptyPasswords no\
PasswordAuthentication yes\
\
# Change to no to disable s/key passwords\
#ChallengeResponseAuthentication yes\
ChallengeResponseAuthentication no\
\
# Kerberos options\
#KerberosAuthentication no\
KerberosAuthentication yes\
#KerberosOrLocalPasswd yes\
#KerberosTicketCleanup yes\
#KerberosGetAFSToken no\
#KerberosUseKuserok yes\
\
# GSSAPI options\
#GSSAPIAuthentication no\
GSSAPIAuthentication yes\
#GSSAPICleanupCredentials yes\
GSSAPICleanupCredentials yes\
#GSSAPIStrictAcceptorCheck yes\
#GSSAPIStrictAcceptorCheck no\
#GSSAPIKeyExchange no\
\
# Set this to 'yes' to enable PAM authentication, account processing, \
# and session processing. If this is enabled, PAM authentication will \
# be allowed through the ChallengeResponseAuthentication and\
# PasswordAuthentication.  Depending on your PAM configuration,\
# PAM authentication via ChallengeResponseAuthentication may bypass\
# the setting of "PermitRootLogin without-password".\
# If you just want the PAM account and session checks to run without\
# PAM authentication, then enable this but set PasswordAuthentication\
# and ChallengeResponseAuthentication to 'no'.\
#UsePAM no\
UsePAM yes\
\
# Accept locale-related environment variables\
AcceptEnv LANG LC_CTYPE LC_NUMERIC LC_TIME LC_COLLATE LC_MONETARY LC_MESSAGES\
AcceptEnv LC_PAPER LC_NAME LC_ADDRESS LC_TELEPHONE LC_MEASUREMENT\
AcceptEnv LC_IDENTIFICATION LC_ALL LANGUAGE\
AcceptEnv XMODIFIERS\
\
#AllowAgentForwarding yes\
#AllowTcpForwarding yes\
#GatewayPorts no\
#X11Forwarding no\
X11Forwarding yes\
#X11DisplayOffset 10\
#X11UseLocalhost yes\
#PrintMotd yes\
#PrintLastLog yes\
#TCPKeepAlive yes\
#UseLogin no\
#UsePrivilegeSeparation yes\
#PermitUserEnvironment no\
#Compression delayed\
#ClientAliveInterval 0\
#ClientAliveCountMax 3\
#ShowPatchLevel no\
#UseDNS yes\
#UseDNS no\
\
#PidFile /var/run/sshd.pid\
#MaxStartups 10\
#PermitTunnel no\
#ChrootDirectory none\
\
# no default banner path\
#Banner none\
\
# override default of no subsystems\
Subsystem	sftp	/usr/libexec/openssh/sftp-server\
\
# Example of overriding settings on a per-user basis\
#Match User anoncvs\
#	X11Forwarding no\
#	AllowTcpForwarding no\
#	ForceCommand cvs server\
}
{\rtf1\ansi\ansicpg1252\cocoartf1187\cocoasubrtf340
{\fonttbl\f0\fswiss\fcharset0 Helvetica;}
{\colortbl;\red255\green255\blue255;}
\margl1440\margr1440\vieww10800\viewh8400\viewkind0
\pard\tx720\tx1440\tx2160\tx2880\tx3600\tx4320\tx5040\tx5760\tx6480\tx7200\tx7920\tx8640\pardirnatural

\f0\fs24 \cf0 Feb 18 16:02:49 ipa1 sshd[20787]: debug3: Wrote 48 bytes for a total of 117405\
Feb 18 16:02:54 ipa1 sshd[20432]: debug3: fd 5 is not O_NONBLOCK\
Feb 18 16:02:54 ipa1 sshd[20432]: debug1: Forked child 21047.\
Feb 18 16:02:54 ipa1 sshd[20432]: debug3: send_rexec_state: entering fd = 8 config len 608\
Feb 18 16:02:54 ipa1 sshd[20432]: debug3: ssh_msg_send: type 0\
Feb 18 16:02:54 ipa1 sshd[20432]: debug3: send_rexec_state: done\
Feb 18 16:02:54 ipa1 sshd[21047]: debug3: oom_adjust_restore\
Feb 18 16:02:54 ipa1 sshd[21047]: Set /proc/self/oom_score_adj to 0\
Feb 18 16:02:54 ipa1 sshd[21047]: debug1: rexec start in 5 out 5 newsock 5 pipe 7 sock 8\
Feb 18 16:02:54 ipa1 sshd[21047]: debug1: inetd sockets after dupping: 3, 3\
Feb 18 16:02:54 ipa1 sshd[21047]: Connection from 10.3.77.43 port 63036\
Feb 18 16:02:54 ipa1 sshd[21047]: debug1: Client protocol version 2.0; client software version SecureCRT_7.0.3 (x64 build 480) SecureCRT\
Feb 18 16:02:54 ipa1 sshd[21047]: debug1: no match: SecureCRT_7.0.3 (x64 build 480) SecureCRT\
Feb 18 16:02:54 ipa1 sshd[21047]: debug1: Enabling compatibility mode for protocol 2.0\
Feb 18 16:02:54 ipa1 sshd[21047]: debug1: Local version string SSH-2.0-OpenSSH_5.3\
Feb 18 16:02:54 ipa1 sshd[21047]: debug2: fd 3 setting O_NONBLOCK\
Feb 18 16:02:54 ipa1 sshd[21047]: debug2: Network child is on pid 21048\
Feb 18 16:02:54 ipa1 sshd[21047]: debug3: preauth child monitor started\
Feb 18 16:02:54 ipa1 sshd[21047]: debug3: mm_request_receive entering\
Feb 18 16:02:54 ipa1 sshd[21048]: debug3: privsep user:group 74:74\
Feb 18 16:02:54 ipa1 sshd[21048]: debug1: permanently_set_uid: 74/74\
Feb 18 16:02:54 ipa1 sshd[21048]: debug1: list_hostkey_types: ssh-rsa,ssh-dss\
Feb 18 16:02:54 ipa1 sshd[21048]: debug1: SSH2_MSG_KEXINIT sent\
Feb 18 16:02:54 ipa1 sshd[21048]: debug3: Wrote 784 bytes for a total of 805\
Feb 18 16:02:54 ipa1 sshd[21048]: debug1: SSH2_MSG_KEXINIT received\
Feb 18 16:02:54 ipa1 sshd[21048]: debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1\
Feb 18 16:02:54 ipa1 sshd[21048]: debug2: kex_parse_kexinit: ssh-rsa,ssh-dss\
Feb 18 16:02:54 ipa1 sshd[21048]: debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-...@lysator.liu.se\
Feb 18 16:02:54 ipa1 sshd[21048]: debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-...@lysator.liu.se\
Feb 18 16:02:54 ipa1 sshd[21048]: debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac...@openssh.com,hmac-ripemd160,hmac-ripemd...@openssh.com,hmac-sha1-96,hmac-md5-96\
Feb 18 16:02:54 ipa1 sshd[21048]: debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac...@openssh.com,hmac-ripemd160,hmac-ripemd...@openssh.com,hmac-sha1-96,hmac-md5-96\
Feb 18 16:02:54 ipa1 sshd[21048]: debug2: kex_parse_kexinit: none,z...@openssh.com\
Feb 18 16:02:54 ipa1 sshd[21048]: debug2: kex_parse_kexinit: none,z...@openssh.com\
Feb 18 16:02:54 ipa1 sshd[21048]: debug2: kex_parse_kexinit: \
Feb 18 16:02:54 ipa1 sshd[21048]: debug2: kex_parse_kexinit: \
Feb 18 16:02:54 ipa1 sshd[21048]: debug2: kex_parse_kexinit: first_kex_follows 0 \
Feb 18 16:02:54 ipa1 sshd[21048]: debug2: kex_parse_kexinit: reserved 0 \
Feb 18 16:02:54 ipa1 sshd[21048]: debug2: kex_parse_kexinit: gss-group1-sha1-toWM5Slw5Ew8Mqkay+al2g==,gss-gex-sha1-toWM5Slw5Ew8Mqkay+al2g==,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1\
Feb 18 16:02:54 ipa1 sshd[21048]: debug2: kex_parse_kexinit: ssh-dss,ssh-rsa,null,x509v3-sign-rsa,x509v3-sign-dss\
Feb 18 16:02:54 ipa1 sshd[21048]: debug2: kex_parse_kexinit: aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,twofish-cbc,blowfish-cbc,3des-cbc,arcfour\
Feb 18 16:02:54 ipa1 sshd[21048]: debug2: kex_parse_kexinit: aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,twofish-cbc,blowfish-cbc,3des-cbc,arcfour\
Feb 18 16:02:54 ipa1 sshd[21048]: debug2: kex_parse_kexinit: hmac-sha1,hmac-sha1-96,hmac-md5,hmac-md5-96,umac...@openssh.com\
Feb 18 16:02:54 ipa1 sshd[21048]: debug2: kex_parse_kexinit: hmac-sha1,hmac-sha1-96,hmac-md5,hmac-md5-96,umac...@openssh.com\
Feb 18 16:02:54 ipa1 sshd[21048]: debug2: kex_parse_kexinit: none\
Feb 18 16:02:54 ipa1 sshd[21048]: debug2: kex_parse_kexinit: none\
Feb 18 16:02:54 ipa1 sshd[21048]: debug2: kex_parse_kexinit: \
Feb 18 16:02:54 ipa1 sshd[21048]: debug2: kex_parse_kexinit: \
Feb 18 16:02:54 ipa1 sshd[21048]: debug2: kex_parse_kexinit: first_kex_follows 0 \
Feb 18 16:02:54 ipa1 sshd[21048]: debug2: kex_parse_kexinit: reserved 0 \
Feb 18 16:02:54 ipa1 sshd[21048]: debug2: mac_setup: found hmac-sha1\
Feb 18 16:02:54 ipa1 sshd[21048]: debug1: kex: client->server aes256-ctr hmac-sha1 none\
Feb 18 16:02:54 ipa1 sshd[21048]: debug3: mm_request_send entering: type 78\
Feb 18 16:02:54 ipa1 sshd[21047]: debug3: monitor_read: checking request 78\
Feb 18 16:02:54 ipa1 sshd[21047]: debug3: mm_request_send entering: type 79\
Feb 18 16:02:54 ipa1 sshd[21047]: debug3: mm_request_receive entering\
Feb 18 16:02:54 ipa1 sshd[21048]: debug3: mm_request_receive_expect entering: type 79\
Feb 18 16:02:54 ipa1 sshd[21048]: debug3: mm_request_receive entering\
Feb 18 16:02:54 ipa1 sshd[21048]: debug2: mac_setup: found hmac-sha1\
Feb 18 16:02:54 ipa1 sshd[21048]: debug1: kex: server->client aes256-ctr hmac-sha1 none\
Feb 18 16:02:54 ipa1 sshd[21048]: debug3: mm_request_send entering: type 78\
Feb 18 16:02:54 ipa1 sshd[21047]: debug3: monitor_read: checking request 78\
Feb 18 16:02:54 ipa1 sshd[21047]: debug3: mm_request_send entering: type 79\
Feb 18 16:02:54 ipa1 sshd[21047]: debug3: mm_request_receive entering\
Feb 18 16:02:54 ipa1 sshd[21048]: debug3: mm_request_receive_expect entering: type 79\
Feb 18 16:02:54 ipa1 sshd[21048]: debug3: mm_request_receive entering\
Feb 18 16:02:54 ipa1 sshd[21048]: debug2: dh_gen_key: priv key bits set: 263/512\
Feb 18 16:02:54 ipa1 sshd[21048]: debug2: bits set: 1041/2048\
Feb 18 16:02:54 ipa1 sshd[21048]: debug1: expecting SSH2_MSG_KEXDH_INIT\
Feb 18 16:02:54 ipa1 sshd[21048]: debug2: bits set: 1023/2048\
Feb 18 16:02:54 ipa1 sshd[21048]: debug3: mm_key_sign entering\
Feb 18 16:02:54 ipa1 sshd[21048]: debug3: mm_request_send entering: type 5\
Feb 18 16:02:54 ipa1 sshd[21047]: debug3: monitor_read: checking request 5\
Feb 18 16:02:54 ipa1 sshd[21047]: debug3: mm_answer_sign\
Feb 18 16:02:54 ipa1 sshd[21047]: debug3: mm_answer_sign: signature 0x7f3db729ae80(55)\
Feb 18 16:02:54 ipa1 sshd[21047]: debug3: mm_request_send entering: type 6\
Feb 18 16:02:54 ipa1 sshd[21047]: debug2: monitor_read: 5 used once, disabling now\
Feb 18 16:02:54 ipa1 sshd[21047]: debug3: mm_request_receive entering\
Feb 18 16:02:54 ipa1 sshd[21048]: debug3: mm_key_sign: waiting for MONITOR_ANS_SIGN\
Feb 18 16:02:54 ipa1 sshd[21048]: debug3: mm_request_receive_expect entering: type 6\
Feb 18 16:02:54 ipa1 sshd[21048]: debug3: mm_request_receive entering\
Feb 18 16:02:54 ipa1 sshd[21048]: debug2: kex_derive_keys\
Feb 18 16:02:54 ipa1 sshd[21048]: debug2: set_newkeys: mode 1\
Feb 18 16:02:54 ipa1 sshd[21048]: debug2: cipher_init: set keylen (16 -> 32)\
Feb 18 16:02:54 ipa1 sshd[21048]: debug1: SSH2_MSG_NEWKEYS sent\
Feb 18 16:02:54 ipa1 sshd[21048]: debug1: expecting SSH2_MSG_NEWKEYS\
Feb 18 16:02:54 ipa1 sshd[21048]: debug3: Wrote 784 bytes for a total of 1589\
Feb 18 16:02:54 ipa1 sshd[21048]: debug2: set_newkeys: mode 0\
Feb 18 16:02:54 ipa1 sshd[21048]: debug2: cipher_init: set keylen (16 -> 32)\
Feb 18 16:02:54 ipa1 sshd[21048]: debug1: SSH2_MSG_NEWKEYS received\
Feb 18 16:02:54 ipa1 sshd[21048]: debug1: KEX done\
Feb 18 16:02:54 ipa1 sshd[21048]: debug3: Wrote 52 bytes for a total of 1641\
Feb 18 16:02:54 ipa1 sshd[21048]: debug1: userauth-request for user administra...@msad.test service ssh-connection method none\
Feb 18 16:02:54 ipa1 sshd[21048]: debug1: attempt 0 failures 0\
Feb 18 16:02:54 ipa1 sshd[21048]: debug3: mm_getpwnamallow entering\
Feb 18 16:02:54 ipa1 sshd[21048]: debug3: mm_request_send entering: type 7\
Feb 18 16:02:54 ipa1 sshd[21047]: debug3: monitor_read: checking request 7\
Feb 18 16:02:54 ipa1 sshd[21047]: debug3: mm_answer_pwnamallow\
Feb 18 16:02:54 ipa1 sshd[21047]: debug3: Trying to reverse map address 10.3.77.43.\
Feb 18 16:02:54 ipa1 sshd[21047]: debug2: parse_server_config: config reprocess config len 608\
Feb 18 16:02:54 ipa1 sshd[21047]: debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1\
Feb 18 16:02:54 ipa1 sshd[21047]: debug3: mm_request_send entering: type 8\
Feb 18 16:02:54 ipa1 sshd[21047]: debug2: monitor_read: 7 used once, disabling now\
Feb 18 16:02:54 ipa1 sshd[21047]: debug3: mm_request_receive entering\
Feb 18 16:02:54 ipa1 sshd[21048]: debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM\
Feb 18 16:02:54 ipa1 sshd[21048]: debug3: mm_request_receive_expect entering: type 8\
Feb 18 16:02:54 ipa1 sshd[21048]: debug3: mm_request_receive entering\
Feb 18 16:02:54 ipa1 sshd[21048]: debug2: input_userauth_request: setting up authctxt for administra...@msad.test\
Feb 18 16:02:54 ipa1 sshd[21048]: debug3: mm_start_pam entering\
Feb 18 16:02:54 ipa1 sshd[21048]: debug3: mm_request_send entering: type 50\
Feb 18 16:02:54 ipa1 sshd[21047]: debug3: monitor_read: checking request 50\
Feb 18 16:02:54 ipa1 sshd[21047]: debug1: PAM: initializing for "administra...@msad.test"\
Feb 18 16:02:54 ipa1 sshd[21047]: debug1: PAM: setting PAM_RHOST to "ad1.msad.test"\
Feb 18 16:02:54 ipa1 sshd[21048]: debug3: mm_inform_authserv entering\
Feb 18 16:02:54 ipa1 sshd[21048]: debug3: mm_request_send entering: type 3\
Feb 18 16:02:54 ipa1 sshd[21048]: debug3: mm_inform_authrole entering\
Feb 18 16:02:54 ipa1 sshd[21048]: debug3: mm_request_send entering: type 4\
Feb 18 16:02:54 ipa1 sshd[21048]: debug2: input_userauth_request: try method none\
Feb 18 16:02:54 ipa1 sshd[21048]: debug3: Wrote 84 bytes for a total of 1725\
Feb 18 16:02:54 ipa1 sshd[21047]: debug1: PAM: setting PAM_TTY to "ssh"\
Feb 18 16:02:54 ipa1 sshd[21047]: debug2: monitor_read: 50 used once, disabling now\
Feb 18 16:02:54 ipa1 sshd[21047]: debug3: mm_request_receive entering\
Feb 18 16:02:54 ipa1 sshd[21047]: debug3: monitor_read: checking request 3\
Feb 18 16:02:54 ipa1 sshd[21047]: debug3: mm_answer_authserv: service=ssh-connection, style=\
Feb 18 16:02:54 ipa1 sshd[21047]: debug2: monitor_read: 3 used once, disabling now\
Feb 18 16:02:54 ipa1 sshd[21047]: debug3: mm_request_receive entering\
Feb 18 16:02:54 ipa1 sshd[21047]: debug3: monitor_read: checking request 4\
Feb 18 16:02:54 ipa1 sshd[21047]: debug3: mm_answer_authrole: role=\
Feb 18 16:02:54 ipa1 sshd[21047]: debug2: monitor_read: 4 used once, disabling now\
Feb 18 16:02:54 ipa1 sshd[21047]: debug3: mm_request_receive entering\
Feb 18 16:02:54 ipa1 sshd[21048]: debug1: userauth-request for user administra...@msad.test service ssh-connection method gssapi-with-mic\
Feb 18 16:02:54 ipa1 sshd[21048]: debug1: attempt 1 failures 0\
Feb 18 16:02:54 ipa1 sshd[21048]: debug2: input_userauth_request: try method gssapi-with-mic\
Feb 18 16:02:54 ipa1 sshd[21048]: debug3: mm_request_send entering: type 38\
Feb 18 16:02:54 ipa1 sshd[21048]: debug3: mm_request_receive_expect entering: type 39\
Feb 18 16:02:54 ipa1 sshd[21048]: debug3: mm_request_receive entering\
Feb 18 16:02:54 ipa1 sshd[21047]: debug3: monitor_read: checking request 38\
Feb 18 16:02:54 ipa1 sshd[21047]: debug3: mm_request_send entering: type 39\
Feb 18 16:02:54 ipa1 sshd[21047]: debug3: mm_request_receive entering\
Feb 18 16:02:54 ipa1 sshd[21048]: Postponed gssapi-with-mic for administra...@msad.test from 10.3.77.43 port 63036 ssh2\
Feb 18 16:02:54 ipa1 sshd[21048]: debug3: Wrote 52 bytes for a total of 1777\
Feb 18 16:02:54 ipa1 sshd[21048]: debug3: mm_request_send entering: type 40\
Feb 18 16:02:54 ipa1 sshd[21048]: debug3: mm_request_receive_expect entering: type 41\
Feb 18 16:02:54 ipa1 sshd[21048]: debug3: mm_request_receive entering\
Feb 18 16:02:54 ipa1 sshd[21047]: debug3: monitor_read: checking request 40\
Feb 18 16:02:54 ipa1 sshd[21047]: debug1: Received some client credentials\
Feb 18 16:02:54 ipa1 sshd[21047]: debug3: mm_request_send entering: type 41\
Feb 18 16:02:54 ipa1 sshd[21048]: debug3: Wrote 196 bytes for a total of 1973\
Feb 18 16:02:54 ipa1 sshd[21047]: debug3: mm_request_receive entering\
Feb 18 16:02:54 ipa1 sshd[21048]: debug3: mm_request_send entering: type 44\
Feb 18 16:02:54 ipa1 sshd[21048]: debug3: mm_request_receive_expect entering: type 45\
Feb 18 16:02:54 ipa1 sshd[21048]: debug3: mm_request_receive entering\
Feb 18 16:02:54 ipa1 sshd[21047]: debug3: monitor_read: checking request 44\
Feb 18 16:02:54 ipa1 sshd[21047]: debug3: mm_request_send entering: type 45\
Feb 18 16:02:54 ipa1 sshd[21048]: debug3: mm_request_send entering: type 42\
Feb 18 16:02:54 ipa1 sshd[21048]: debug3: mm_request_receive_expect entering: type 43\
Feb 18 16:02:54 ipa1 sshd[21048]: debug3: mm_request_receive entering\
Feb 18 16:02:54 ipa1 sshd[21047]: debug3: mm_request_receive entering\
Feb 18 16:02:54 ipa1 sshd[21047]: debug3: monitor_read: checking request 42\
Feb 18 16:02:54 ipa1 sshd[21047]: debug3: mm_answer_gss_userok: sending result 0\
Feb 18 16:02:54 ipa1 sshd[21047]: debug3: mm_request_send entering: type 43\
Feb 18 16:02:54 ipa1 sshd[21048]: debug3: mm_ssh_gssapi_userok: user not authenticated\
Feb 18 16:02:54 ipa1 sshd[21048]: debug3: Wrote 84 bytes for a total of 2057\
Feb 18 16:02:54 ipa1 sshd[21047]: Failed gssapi-with-mic for administra...@msad.test from 10.3.77.43 port 63036 ssh2\
Feb 18 16:02:54 ipa1 sshd[21047]: debug3: mm_request_receive entering\
Feb 18 16:02:56 ipa1 sshd[21048]: Received disconnect from 10.3.77.43: 14: Unable to authenticate using any of the configured authentication methods. \
Feb 18 16:02:56 ipa1 sshd[21048]: debug1: do_cleanup\
Feb 18 16:02:56 ipa1 sshd[21048]: debug3: PAM: sshpam_thread_cleanup entering\
Feb 18 16:02:56 ipa1 sshd[21048]: debug3: mm_request_send entering: type 80\
Feb 18 16:02:56 ipa1 sshd[21048]: debug3: mm_request_receive_expect entering: type 81\
Feb 18 16:02:56 ipa1 sshd[21048]: debug3: mm_request_receive entering\
Feb 18 16:02:56 ipa1 sshd[21047]: debug3: monitor_read: checking request 80\
Feb 18 16:02:56 ipa1 sshd[21047]: debug3: mm_request_send entering: type 81\
Feb 18 16:02:56 ipa1 sshd[21047]: debug3: mm_request_receive entering\
Feb 18 16:02:56 ipa1 sshd[21047]: debug1: do_cleanup\
Feb 18 16:02:56 ipa1 sshd[21047]: debug1: PAM: cleanup\
Feb 18 16:02:56 ipa1 sshd[21047]: debug3: PAM: sshpam_thread_cleanup entering}


On Feb 18, 2013, at 3:58 PM, Brian Cook <bc...@redhat.com> wrote:

> I am trying to ssh from Windows - > IPA server using GSS-API.  I've tried 
> putty, which provides very little debug out.  I then downloaded securecrt 
> which provides more output.
> 
> On the server side, I just see postponed gss-with-mic  and then a failure 
> message.  I'm attaching the output from securecrt.  Any help would be greatly 
> appreciated.
> 
> Thanks,
> Brian
> 
> <securecrt-out.rtf>_______________________________________________
> Freeipa-users mailing list
> Freeipa-users@redhat.com
> https://www.redhat.com/mailman/listinfo/freeipa-users

_______________________________________________
Freeipa-users mailing list
Freeipa-users@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-users

Reply via email to