The OpenAFS client for windows uses an additional netbios name such that
the hostname of the computer is appended with -AFS. Windows incessantly
attempts TGS_REQs for this netbios name.  My hostname is w13.  For
example:

Nov 28 13:46:40 s2.stradamotorsports.com krb5kdc[56463](info): TGS_REQ (7
etypes {23 -133 -128 3 1 24 -135}) 192.168.1.13: UNKNOWN_SERVER: authtime
1070053633, [EMAIL PROTECTED] for
HOST/[EMAIL PROTECTED], Server not fo und in Kerberos database

I do not have a host that is actually named w13-afs on my network so I do
not have a host/w13-afs principal in my kerberos database.

Except for spamming this heck out of my logs, windows authenticating to my
MIT KDC works fine.

I would prefer to not have to add a phoney host principle just to suppress
windows goofy behavior.

Does anybody know how to get windows to stop making requests for this
extra netbios name?

Thanks,
Jason C. Wells

________________________________________________
Kerberos mailing list           [EMAIL PROTECTED]
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to