Hi,Hello MIT team, I'm Anil working for IBM and implemented Kebreros 
for a customer. Kerberos – AD is implemented on Hadoop environment. 
Phoenix is enabled to open JDBC / ODBC connection to Hadoop HBase. Hadoop is 
setup on RHEL 7.2Windows client machines connecting to Hadoop Phoenix using 
Hortonworks Phoenix ODBC driver (64 bit). As connection should be established 
to Kerberos Phoenix, the Windows ODBC client machine also must be setup with 
Kerberos.Windows odbc client machine has been setup with MIT Kerberos as per 
the documentation link 
https://community.hortonworks.com/articles/28537/user-authentication-from-windows-workstation-to-hd.htmlCopied
 the krb5.conf file to windows machine as krb5.ini. Using MIT Kerberos key 
tool, get new Kerberos ticket say for user ‘kpiuser’ as shown 
below;On establishing connection from ODBC client, phoenix connection fails 
with log message “GSSException: Defective token detected (Mechanism 
level: GSS!
 Header did not find the right tag)”.Refer to 
Error-in-phoenix-log.txtThis implies, the Kerberos ticket format is different 
or corrupted.The phoenix ODBC client logs shows connection errors.Refer to 
HortonworksPhoenixODBCDriver_connection_1.log and phoenix_driver.logOn windows 
client machine, doing kinit for a user does not show the cached ticket when run 
klist command.Refer to klist-on-windows-odbc-client.txtThanks,Anil 
2018-07-10 19:28:16,272 WARN 
org.apache.phoenix.shaded.org.eclipse.jetty.security.SpnegoLoginService:
GSSException: Defective token detected (Mechanism level: GSSHeader did not find 
the right tag)
        at sun.security.jgss.GSSHeader.<init>(GSSHeader.java:97)
        at 
sun.security.jgss.GSSContextImpl.acceptSecContext(GSSContextImpl.java:306)
        at 
sun.security.jgss.GSSContextImpl.acceptSecContext(GSSContextImpl.java:285)
        at 
org.apache.phoenix.shaded.org.eclipse.jetty.security.SpnegoLoginService.login(SpnegoLoginService.java:137)
        at 
org.apache.phoenix.shaded.org.eclipse.jetty.security.authentication.LoginAuthenticator.login(LoginAuthenticator.java:61)
        at 
org.apache.phoenix.shaded.org.eclipse.jetty.security.authentication.SpnegoAuthenticator.validateRequest(SpnegoAuthenticator.java:99)
        at 
org.apache.phoenix.shaded.org.eclipse.jetty.security.SecurityHandler.handle(SecurityHandler.java:512)
        at 
org.apache.phoenix.shaded.org.eclipse.jetty.server.handler.HandlerList.handle(HandlerList.java:52)
        at 
org.apache.phoenix.shaded.org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:97)
        at 
org.apache.phoenix.shaded.org.eclipse.jetty.server.Server.handle(Server.java:499)
        at 
org.apache.phoenix.shaded.org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:311)
        at 
org.apache.phoenix.shaded.org.eclipse.jetty.server.HttpConnection.onFillable(HttpConnection.java:257)
        at 
org.apache.phoenix.shaded.org.eclipse.jetty.io.AbstractConnection$2.run(AbstractConnection.java:544)
        at 
org.apache.phoenix.shaded.org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:635)
        at 
org.apache.phoenix.shaded.org.eclipse.jetty.util.thread.QueuedThreadPool$3.run(QueuedThreadPool.java:555)
        at java.lang.Thread.run(Thread.java:745)
2018-07-10 19:28:16,276 WARN 
org.apache.phoenix.shaded.org.eclipse.jetty.security.SpnegoLoginService:
GSSException: Defective token detected (Mechanism level: GSSHeader did not find 
the right tag)
        at sun.security.jgss.GSSHeader.<init>(GSSHeader.java:97)
        at 
sun.security.jgss.GSSContextImpl.acceptSecContext(GSSContextImpl.java:306)
        at 
sun.security.jgss.GSSContextImpl.acceptSecContext(GSSContextImpl.java:285)
        at 
org.apache.phoenix.shaded.org.eclipse.jetty.security.SpnegoLoginService.login(SpnegoLoginService.java:137)
        at 
org.apache.phoenix.shaded.org.eclipse.jetty.security.authentication.LoginAuthenticator.login(LoginAuthenticator.java:61)
        at 
org.apache.phoenix.shaded.org.eclipse.jetty.security.authentication.SpnegoAuthenticator.validateRequest(SpnegoAuthenticator.java:99)
        at 
org.apache.phoenix.shaded.org.eclipse.jetty.security.SecurityHandler.handle(SecurityHandler.java:512)
        at 
org.apache.phoenix.shaded.org.eclipse.jetty.server.handler.HandlerList.handle(HandlerList.java:52)
        at 
org.apache.phoenix.shaded.org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:97)
        at 
org.apache.phoenix.shaded.org.eclipse.jetty.server.Server.handle(Server.java:499)
        at 
org.apache.phoenix.shaded.org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:311)
        at 
org.apache.phoenix.shaded.org.eclipse.jetty.server.HttpConnection.onFillable(HttpConnection.java:257)
        at 
org.apache.phoenix.shaded.org.eclipse.jetty.io.AbstractConnection$2.run(AbstractConnection.java:544)
        at 
org.apache.phoenix.shaded.org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:635)
        at 
org.apache.phoenix.shaded.org.eclipse.jetty.util.thread.QueuedThreadPool$3.run(QueuedThreadPool.java:555)
        at java.lang.Thread.run(Thread.java:745)
2018-07-10 19:28:16,280 WARN 
org.apache.phoenix.shaded.org.eclipse.jetty.security.SpnegoLoginService:
GSSException: Defective token detected (Mechanism level: GSSHeader did not find 
the right tag)
        at sun.security.jgss.GSSHeader.<init>(GSSHeader.java:97)
C:\Users\test2>klist

Current LogonId is 0:0x2b844

Cached Tickets: (3)

#0>     Client: test2 @ AAS.COM
        Server: krbtgt/AAS.COM @ AAS.COM
        KerbTicket Encryption Type: AES-256-CTS-HMAC-SHA1-96
        Ticket Flags 0x40e10000 -> forwardable renewable initial pre_authent nam
e_canonicalize
        Start Time: 7/26/2018 10:46:39 (local)
        End Time:   7/26/2018 11:46:39 (local)
        Renew Time: 8/1/2018 16:47:01 (local)
        Session Key Type: AES-256-CTS-HMAC-SHA1-96
        Cache Flags: 0x1 -> PRIMARY
        Kdc Called: AASDCMGMT01.aas.com

#1>     Client: test2 @ AAS.COM
        Server: ldap/AASDCMGMT01.aas.com @ AAS.COM
        KerbTicket Encryption Type: AES-256-CTS-HMAC-SHA1-96
        Ticket Flags 0x40a50000 -> forwardable renewable pre_authent ok_as_deleg
ate name_canonicalize
        Start Time: 7/25/2018 16:47:01 (local)
        End Time:   7/25/2018 17:47:01 (local)
        Renew Time: 8/1/2018 16:47:01 (local)
        Session Key Type: AES-256-CTS-HMAC-SHA1-96
        Cache Flags: 0
        Kdc Called: AASDCMGMT01.aas.com

#2>     Client: test2 @ AAS.COM
        Server: LDAP/AASDCMGMT01.aas.com/aas.com @ AAS.COM
        KerbTicket Encryption Type: AES-256-CTS-HMAC-SHA1-96
        Ticket Flags 0x40a50000 -> forwardable renewable pre_authent ok_as_deleg
ate name_canonicalize
        Start Time: 7/25/2018 16:47:01 (local)
        End Time:   7/25/2018 17:47:01 (local)
        Renew Time: 8/1/2018 16:47:01 (local)
        Session Key Type: AES-256-CTS-HMAC-SHA1-96
        Cache Flags: 0
        Kdc Called: AASDCMGMT01.aas.com

C:\Users\test2>kinit [email protected]
Password for [email protected]:

C:\Users\test2>klist

Current LogonId is 0:0x2b844

Cached Tickets: (3)

#0>     Client: test2 @ AAS.COM
        Server: krbtgt/AAS.COM @ AAS.COM
        KerbTicket Encryption Type: AES-256-CTS-HMAC-SHA1-96
        Ticket Flags 0x40e10000 -> forwardable renewable initial pre_authent nam
e_canonicalize
        Start Time: 7/26/2018 11:31:38 (local)
        End Time:   7/26/2018 12:31:38 (local)
        Renew Time: 8/1/2018 16:47:01 (local)
        Session Key Type: AES-256-CTS-HMAC-SHA1-96
        Cache Flags: 0x1 -> PRIMARY
        Kdc Called: AASDCMGMT01.aas.com

#1>     Client: test2 @ AAS.COM
        Server: ldap/AASDCMGMT01.aas.com @ AAS.COM
        KerbTicket Encryption Type: AES-256-CTS-HMAC-SHA1-96
        Ticket Flags 0x40a50000 -> forwardable renewable pre_authent ok_as_deleg
ate name_canonicalize
        Start Time: 7/25/2018 16:47:01 (local)
        End Time:   7/25/2018 17:47:01 (local)
        Renew Time: 8/1/2018 16:47:01 (local)
        Session Key Type: AES-256-CTS-HMAC-SHA1-96
        Cache Flags: 0
        Kdc Called: AASDCMGMT01.aas.com

#2>     Client: test2 @ AAS.COM
        Server: LDAP/AASDCMGMT01.aas.com/aas.com @ AAS.COM
        KerbTicket Encryption Type: AES-256-CTS-HMAC-SHA1-96
        Ticket Flags 0x40a50000 -> forwardable renewable pre_authent ok_as_deleg
ate name_canonicalize
        Start Time: 7/25/2018 16:47:01 (local)
        End Time:   7/25/2018 17:47:01 (local)
        Renew Time: 8/1/2018 16:47:01 (local)
        Session Key Type: AES-256-CTS-HMAC-SHA1-96
        Cache Flags: 0
        Kdc Called: AASDCMGMT01.aas.com

C:\Users\test2>
________________________________________________
Kerberos mailing list           [email protected]
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to