Are you sure add kdc_allow_udp = false in kdc.conf?

Thanks
Jiajia

-----Original Message-----
From: Colm O hEigeartaigh [mailto:cohei...@apache.org] 
Sent: Friday, May 5, 2017 11:41 PM
To: Li, Jiajia <jiajia...@intel.com>
Cc: kerby@directory.apache.org; Zheng, Kai <kai.zh...@intel.com>; 
mailto:m.c.delig...@xs4all.nl <m.c.delig...@xs4all.nl>
Subject: Re: MIT Kerberos compatibility

Sorry, it was my error, UDP was actually enabled there. But why am I still 
seeing that error message?

Colm.

On Fri, May 5, 2017 at 4:39 PM, Li, Jiajia <jiajia...@intel.com> wrote:

> Hi Colm,
> I also test the Kerby KDC with kerby kint and MIT kinit, and only 
> listen the tcp port(disable udp), both got ticket successfully. But I 
> don't get the error message. Both krb.conf and kdc.conf should set udp 
> to be false, udp is enabled in default.
>
> Thanks
> Jiajia
>
> -----Original Message-----
> From: Colm O hEigeartaigh [mailto:cohei...@apache.org]
> Sent: Friday, May 5, 2017 11:34 PM
> To: kerby@directory.apache.org
> Cc: Zheng, Kai <kai.zh...@intel.com>; mailto:m.c.delig...@xs4all.nl < 
> m.c.delig...@xs4all.nl>
> Subject: Re: MIT Kerberos compatibility
>
> Hi Jiajia,
>
> If UDP is disabled and we don't use Netty, I can get a token 
> successfully via kinit. However I then see an error message in the Kerby 
> console:
>
> Exception in thread "Thread-1" java.lang.RuntimeException: Error 
> occured while checking udp connections
>     at
> org.apache.kerby.kerberos.kerb.transport.KdcNetwork.run(
> KdcNetwork.java:105)
>     at
> org.apache.kerby.kerberos.kerb.transport.KdcNetwork.
> access$000(KdcNetwork.java:39)
>     at
> org.apache.kerby.kerberos.kerb.transport.KdcNetwork$1.
> run(KdcNetwork.java:75)
>     at java.lang.Thread.run(Thread.java:748)
> Caused by: java.nio.channels.ClosedChannelException
>     at
> sun.nio.ch.DatagramChannelImpl.ensureOpen(DatagramChannelImpl.java:320)
>     at sun.nio.ch.DatagramChannelImpl.receive(
> DatagramChannelImpl.java:331)
>     at
> org.apache.kerby.kerberos.kerb.transport.KdcNetwork.
> checkUdpMessage(KdcNetwork.java:132)
>     at
> org.apache.kerby.kerberos.kerb.transport.KdcNetwork.run(
> KdcNetwork.java:101)
>
> I'm not sure why we are seeing UDP errors when it's disabled?
>
> Colm.
>
> On Fri, May 5, 2017 at 3:57 PM, Li, Jiajia <jiajia...@intel.com> wrote:
>
> > Hi Colm,
> > The shell client can't connect to kdc if the UDP is disabled.
> > We don't use Netty in default.
> > What's your test-cases? The same as the Marc's?
> >
> > Thanks
> > Jiajia
> >
> > -----Original Message-----
> > From: Colm O hEigeartaigh [mailto:cohei...@apache.org]
> > Sent: Friday, May 5, 2017 10:09 PM
> > To: kerby@directory.apache.org
> > Cc: Zheng, Kai <kai.zh...@intel.com>; mailto:m.c.delig...@xs4all.nl 
> > < m.c.delig...@xs4all.nl>
> > Subject: Re: MIT Kerberos compatibility
> >
> > Hi Jiajia,
> >
> > What are the issues if UDP is disabled and we don't use Netty? I 
> > tried doing this with my own test-cases and it didn't work, so it 
> > would be good to get this fixed soon.
> >
> > Colm.
> >
> > On Fri, May 5, 2017 at 2:46 PM, Li, Jiajia <jiajia...@intel.com> wrote:
> >
> > > Hi Marc,
> > > >>> - your KRB5 tracing looks quite different. What OS and 
> > > >>> mit-kerberos
> > > version did you use?
> > > I use mac os and the python version is 2.7.10
> > >
> > > >>>- your KRB5 tracing shows UDP comms between kerberos client and 
> > > >>>KDC,
> > > despite the allowUDP = false setting
> > > >>> in my test. I did this setting because I get different 
> > > >>> problems
> > > without it, see the additional logs below. So,
> > > >>>we must also be aware of networking problems at my side.
> > > I enable the UDP and use netty network, there are some issues if 
> > > UDP disabled, you can create a JIRA for this and we can fix this 
> > > issue in the next release version.
> > >
> > > The changes in my side as following:
> > >
> > > protected boolean allowUdp() {
> > >     return true;
> > > }
> > > @Override
> > > protected void prepareKdc() throws KrbException {
> > >     getKdcServer().setInnerKdcImpl(
> > >             new NettyKdcServerImpl(getKdcServer().getKdcSetting()));
> > >     super.prepareKdc();
> > > }
> > >
> > > Here is log of MitIssueTest:
> > > [INFO] Running org.apache.kerby.kerberos.kerb.server.MitIssueTest
> > > [nioEventLoopGroup-2-1] INFO 
> > > io.netty.handler.logging.LoggingHandler
> > > -
> > > [id: 0x2634fe6b] REGISTERED
> > > [nioEventLoopGroup-2-1] INFO 
> > > io.netty.handler.logging.LoggingHandler
> > > -
> > > [id: 0x2634fe6b] BIND(0.0.0.0/0.0.0.0:53957) 
> > > [nioEventLoopGroup-2-1] INFO 
> > > io.netty.handler.logging.LoggingHandler -
> > > [id: 0x2634fe6b, /0:0:0:0:0:0:0:0:53957] ACTIVE [main] INFO 
> > > org.apache.kerby.kerberos.kdc.impl.NettyKdcServerImpl - Netty kdc 
> > > server started.
> > > [nioEventLoopGroup-2-1] INFO 
> > > io.netty.handler.logging.LoggingHandler
> > > -
> > > [id: 0x2634fe6b, /0:0:0:0:0:0:0:0:53957] RECEIVED: [id: 
> > > 0xdac7228b, /
> > > 127.0.0.1:53961 => /127.0.0.1:53957] 
> > > [defaultEventExecutorGroup-4-1] INFO 
> > > org.apache.kerby.kerberos.kerb.server.request.AsRequest
> > > - AS_REQ ISSUE: authtime 1493991123792,dran...@test.com for 
> > > krbtgt/ test....@test.com [main] INFO 
> > > org.apache.kerby.kerberos.kerb.client.impl.DefaultInternalKrbClien
> > > t
> > > - Send to kdc success.
> > > [main] INFO org.apache.kerby.kerberos.kerb.client.KrbClientBase - 
> > > Storing the tgt to the credential cache file.
> > > [nioEventLoopGroup-5-1] INFO
> > > org.apache.kerby.kerberos.kerb.server.request.KdcRequest
> > > - The preauth data is empty.
> > > [nioEventLoopGroup-5-1] INFO
> > > org.apache.kerby.kerberos.kerb.server.KdcHandler
> > > - KRB error occurred while processing request:Additional 
> > > pre-authentication required [nioEventLoopGroup-5-1] INFO 
> > > org.apache.kerby.kerberos.kerb.server.request.AsRequest
> > > - AS_REQ ISSUE: authtime
> > > 1493991123859,test-service/localh...@test.com
> > > for krbtgt/test....@test.com
> > > [nioEventLoopGroup-5-1] INFO
> > > org.apache.kerby.kerberos.kerb.server.request.TgsRequest
> > > - TGS_REQ ISSUE: authtime 1493991142850,drankye for test-service/ 
> > > localh...@test.com
> > >
> > > Thanks
> > > Jiajia
> > >
> > > -----Original Message-----
> > > From: Zheng, Kai
> > > Sent: Friday, May 5, 2017 7:46 PM
> > > To: kerby@directory.apache.org; Li, Jiajia <jiajia...@intel.com>
> > > Subject: RE: MIT Kerberos compatibility
> > >
> > > Hi Marc,
> > >
> > > Looks like this is quite environment related, could you fire an 
> > > issue for this? I would suggest we target it to 1.1.0, which can 
> > > be done in
> > June.
> > >
> > > Regards,
> > > Kai
> > >
> > > -----Original Message-----
> > > From: Marc de Lignie [mailto:m.c.delig...@xs4all.nl]
> > > Sent: Friday, May 05, 2017 4:44 PM
> > > To: Li, Jiajia <jiajia...@intel.com>
> > > Cc: kerby@directory.apache.org
> > > Subject: Re: MIT Kerberos compatibility
> > >
> > > Hi Jiajia,
> > >
> > > Great to read that you made progress on this issue and to see a 
> > > working config at your side. Below, I list my progress below (with 
> > > trunk merged into my MitIssue branch), but I am afraid we are not 
> > > done
> > yet.
> > >
> > > Things that stand out:
> > >
> > > - the kdc decoding error is solved, relative to the logs without 
> > > your patch
> > >
> > > - your KRB5 tracing looks quite different. What OS and 
> > > mit-kerberos version did you use?
> > >
> > > - your KRB5 tracing shows UDP comms between kerberos client and 
> > > KDC, despite the allowUDP = false setting in my test. I did this 
> > > setting because I get different problems without it, see the 
> > > additional logs below. So, we must also be aware of networking problems 
> > > at my side.
> > >
> > > - the "Response was not from master KDC" msg is not relevant; it 
> > > disappears if you manually add master_kdc to the realms section of 
> > > the krb5.conf
> > >
> > > I have no idea how to proceed from here, so that is why I just 
> > > document the status at my side and ask about your - apparently 
> > > working -
> > config.
> > >
> > > Cheers,   Marc
> > >
> > >
> > > KDC logging with allowUDP = false:
> > >
> > > [INFO] Running org.apache.kerby.kerberos.kerb.server.MitIssueTest
> > > [pool-1-thread-1] INFO
> > > org.apache.kerby.kerberos.kerb.server.request.AsRequest - AS_REQ
> ISSUE:
> > > authtime 1493970789075,dran...@test.com for 
> > > krbtgt/test....@test.com [main] INFO 
> > > org.apache.kerby.kerberos.kerb.client.impl.DefaultInternalKrbClien
> > > t
> > > - Send to kdc success.
> > > [main] INFO org.apache.kerby.kerberos.kerb.client.KrbClientBase - 
> > > Storing the tgt to the credential cache file.
> > > [pool-1-thread-1] INFO
> > > org.apache.kerby.kerberos.kerb.server.request.KdcRequest - The 
> > > preauth data is empty.
> > > [pool-1-thread-1] INFO
> > > org.apache.kerby.kerberos.kerb.server.KdcHandler
> > > - KRB error occurred while processing request:Additional 
> > > pre-authentication required [pool-1-thread-1] INFO 
> > > org.apache.kerby.kerberos.kerb.server.request.AsRequest - AS_REQ
> ISSUE:
> > > authtime 1493970789108,test-service/localh...@test.com for krbtgt/ 
> > > test....@test.com [pool-1-thread-1] INFO 
> > > org.apache.kerby.kerberos.kerb.server.request.KdcRequest
> > > - Found fast padata and starting to process it.
> > > [pool-1-thread-1] INFO
> > > org.apache.kerby.kerberos.kerb.server.request.KdcRequest - Found 
> > > fast padata and starting to process it.
> > >
> > > Python script KRB5 tracing (MIT Kerberos 1.13.2 of Ubuntu Xenial) 
> > > with allowUDP = false:
> > >
> > > $ .
> > > kerby-kerb/kerb-kdc-test/src/test/java/org/apache/kerby/
> > > kerberos/kerb/server/MitIssueTest.sh
> > > [25281] 1493970797.298753: Retrieving dran...@test.com from 
> > > FILE:/etc/krb5/user/1000/client.keytab (vno 0, enctype 0) with result:
> > > 2/Key table file '/etc/krb5/user/1000/client.keytab' not found 
> > > [25281]
> > > 1493970797.298952: Retrieving dran...@test.com from 
> > > FILE:/etc/krb5/user/1000/client.keytab (vno 0, enctype 0) with result:
> > > 2/Key table file '/etc/krb5/user/1000/client.keytab' not found 
> > > [25281]
> > > 1493970797.299106: Retrieving dran...@test.com from 
> > > FILE:/etc/krb5/user/1000/client.keytab (vno 0, enctype 0) with result:
> > > 2/Key table file '/etc/krb5/user/1000/client.keytab' not found 
> > > [25281]
> > > 1493970797.299213: Retrieving dran...@test.com from 
> > > FILE:/etc/krb5/user/1000/client.keytab (vno 0, enctype 0) with result:
> > > 2/Key table file '/etc/krb5/user/1000/client.keytab' not found 
> > > [25281]
> > > 1493970797.299323: Retrieving dran...@test.com from 
> > > FILE:/etc/krb5/user/1000/client.keytab (vno 0, enctype 0) with result:
> > > 2/Key table file '/etc/krb5/user/1000/client.keytab' not found 
> > > [25281]
> > > 1493970797.299436: Retrieving dran...@test.com from 
> > > FILE:/etc/krb5/user/1000/client.keytab (vno 0, enctype 0) with result:
> > > 2/Key table file '/etc/krb5/user/1000/client.keytab' not found 
> > > [25281]
> > > 1493970797.299545: Retrieving dran...@test.com from 
> > > FILE:/etc/krb5/user/1000/client.keytab (vno 0, enctype 0) with result:
> > > 2/Key table file '/etc/krb5/user/1000/client.keytab' not found 
> > > [25281]
> > > 1493970797.299654: Retrieving dran...@test.com from 
> > > FILE:/etc/krb5/user/1000/client.keytab (vno 0, enctype 0) with result:
> > > 2/Key table file '/etc/krb5/user/1000/client.keytab' not found 
> > > kerberos.authGSSClientInit successful [25281] 1493970797.299922:
> > > Getting credentials dran...@test.com -> test-service/localhost@ 
> > > using ccache FILE:kerby-kerb/kerb-kdc-test/target/tmp/test-tkt.cc
> > > [25281] 1493970797.299945: Retrieving dran...@test.com -> 
> > > test-service/localhost@ from 
> > > FILE:kerby-kerb/kerb-kdc-test/target/tmp/test-tkt.cc
> > > with result:
> > > -1765328243/Matching credential not found [25281] 1493970797.299959:
> > > Retrying dran...@test.com -> test-service/localh...@test.com with
> > result:
> > > -1765328243/Matching credential not found [25281] 1493970797.299962:
> > > Server has referral realm; starting with 
> > > test-service/localh...@test.com [25281]
> > > 1493970797.299975: Retrieving dran...@test.com -> 
> > > krbtgt/test....@test.com from 
> > > FILE:kerby-kerb/kerb-kdc-test/target/tmp/test-tkt.cc
> > with result:
> > > 0/Success [25281] 1493970797.299979: Starting with TGT for client
> realm:
> > > dran...@test.com -> krbtgt/test....@test.com [25281]
> 1493970797.299981:
> > > Requesting tickets for test-service/localh...@test.com, referrals 
> > > on [25281] 1493970797.299994: Generated subkey for TGS request:
> > > aes128-cts/1B9B [25281] 1493970797.300009: etypes requested in TGS
> > request:
> > > aes256-cts, aes128-cts, des3-cbc-sha1, rc4-hmac, camellia128-cts, 
> > > camellia256-cts [25281] 1493970797.300054: Encoding request body 
> > > and padata into FAST request [25281] 1493970797.300080: Sending 
> > > request
> > > (823 bytes) to TEST.COM [25281] 1493970797.300091: Resolving 
> > > hostname localhost [25281]
> > > 1493970797.300136: Initiating TCP connection to stream
> > > 127.0.0.1:34319
> > > [25281] 1493970797.300191: Sending TCP request to stream
> > > 127.0.0.1:34319 [25281] 1493970797.303610: Received answer (125
> > > bytes) from stream
> > > 127.0.0.1:34319
> > > [25281] 1493970797.303618: Terminating TCP connection to stream
> > > 127.0.0.1:34319
> > > [25281] 1493970797.553126: Response was not from master KDC 
> > > [25281]
> > > 1493970797.553198: TGS request result: -1765323383/Unknown code 
> > > krcM
> > > 137 [25281] 1493970797.553234: Requesting tickets for 
> > > test-service/ localh...@test.com, referrals off [25281] 1493970797.553273:
> > > Generated subkey for TGS request: aes128-cts/94C6 [25281]
> 1493970797.553323:
> > > etypes requested in TGS request: aes256-cts, aes128-cts, 
> > > des3-cbc-sha1, rc4-hmac, camellia128-cts, camellia256-cts [25281]
> > > 1493970797.553436: Encoding request body and padata into FAST 
> > > request
> > [25281] 1493970797.553532:
> > > Sending request (823 bytes) to TEST.COM [25281] 1493970797.553567:
> > > Resolving hostname localhost [25281] 1493970797.553745: Initiating 
> > > TCP connection to stream
> > > 127.0.0.1:34319
> > > [25281] 1493970797.553889: Sending TCP request to stream
> > > 127.0.0.1:34319 [25281] 1493970797.558297: Received answer (125
> > > bytes) from stream
> > > 127.0.0.1:34319
> > > [25281] 1493970797.558318: Terminating TCP connection to stream
> > > 127.0.0.1:34319
> > > [25281] 1493970797.561189: Response was not from master KDC 
> > > [25281]
> > > 1493970797.561258: TGS request result: -1765323383/Unknown code 
> > > krcM
> > > 137 ('First kerberos.authGSSClientStep not successful', 
> > > GSSError(('Unspecified GSS failure.  Minor code may provide more 
> > > information', 851968), ('Unknown code krcM 137', -1765323383)))
> > >
> > >
> > > KDC logging with allowUDP = true:
> > >
> > > [INFO] Running org.apache.kerby.kerberos.kerb.server.MitIssueTest
> > > [pool-1-thread-1] INFO
> > > org.apache.kerby.kerberos.kerb.server.request.AsRequest - AS_REQ
> ISSUE:
> > > authtime 1493972505784,dran...@test.com for 
> > > krbtgt/test....@test.com [main] INFO 
> > > org.apache.kerby.kerberos.kerb.client.impl.DefaultInternalKrbClien
> > > t
> > > - Send to kdc success.
> > > [main] INFO org.apache.kerby.kerberos.kerb.client.KrbClientBase - 
> > > Storing the tgt to the credential cache file.
> > > [pool-1-thread-1] INFO
> > > org.apache.kerby.kerberos.kerb.server.request.KdcRequest - The 
> > > preauth data is empty.
> > > [pool-1-thread-1] INFO
> > > org.apache.kerby.kerberos.kerb.server.KdcHandler
> > > - KRB error occurred while processing request:Additional 
> > > pre-authentication required [pool-1-thread-2] INFO 
> > > org.apache.kerby.kerberos.kerb.server.request.AsRequest - AS_REQ
> ISSUE:
> > > authtime 1493972505948,test-service/localh...@test.com for krbtgt/ 
> > > test....@test.com Exception in thread "Thread-0"
> > > java.lang.RuntimeException: Error occured while checking udp
> connections
> > >      at
> > > org.apache.kerby.kerberos.kerb.transport.KdcNetwork.run(
> > > KdcNetwork.java:105)
> > >      at
> > > org.apache.kerby.kerberos.kerb.transport.KdcNetwork.
> > > access$000(KdcNetwork.java:39)
> > >      at
> > > org.apache.kerby.kerberos.kerb.transport.KdcNetwork$1.
> > > run(KdcNetwork.java:75)
> > >      at java.lang.Thread.run(Thread.java:748)
> > > Caused by: java.nio.channels.ClosedChannelException
> > >      at
> > > sun.nio.ch.DatagramChannelImpl.ensureOpen(
> DatagramChannelImpl.java:320)
> > >      at sun.nio.ch.DatagramChannelImpl.receive(
> > > DatagramChannelImpl.java:331)
> > >      at
> > > org.apache.kerby.kerberos.kerb.transport.KdcNetwork.
> > > checkUdpMessage(KdcNetwork.java:132)
> > >      at
> > > org.apache.kerby.kerberos.kerb.transport.KdcNetwork.run(
> > > KdcNetwork.java:101)
> > >      ... 3 more
> > >
> > >
> > > krb5.conf:
> > >
> > > [libdefaults]
> > >      kdc_realm = TEST.COM
> > >      default_realm = TEST.COM
> > >      udp_preference_limit = 4096
> > >      kdc_tcp_port = 37080
> > >      kdc_udp_port = 36525
> > >
> > > [realms]
> > >      TEST.COM = {
> > >          kdc = localhost:36525
> > >      }
> > >
> > > And port 36525 does not show up in `netstat -l` (while 37080 does)
> > >
> > >
> > > Op 04-05-17 om 14:55 schreef Li, Jiajia:
> > > > Hi Marc,
> > > > I try to run your test(through applying your patch in the trunk) 
> > > > , I
> > > think it's success now.  Could you take some time to check about it?
> > > > Here is the log:
> > > >
> > > > directory-kerby git:(trunk) ✗ .
> > > > kerby-kerb/kerb-kdc-test/src/test/java/org/apache/kerby/kerberos
> > > > /k
> > > > er
> > > > b/
> > > > server/MitIssueTest.sh
> > > > kerberos.authGSSClientInit successful
> > > > 2017-05-04T20:44:06 set-error: -1765328234: entypes not 
> > > > supported
> > > > 2017-05-04T20:44:06 set-error: -1765328243: Did not find 
> > > > credential for krb5_ccache_conf_data/realm-config@X-CACHECONF: 
> > > > in cache FILE:kerby-kerb/kerb-kdc-test/target/tmp/test-tkt.cc
> > > > 2017-05-04T20:44:06 set-error: -1765328243: Did not find 
> > > > credential for test-service/localh...@test.com in cache 
> > > > FILE:kerby-kerb/kerb-kdc-test/target/tmp/test-tkt.cc
> > > > 2017-05-04T20:44:06 set-error: -1765328243: Did not find 
> > > > credential for
> > > > krb5_ccache_conf_data/negative-cache/test-service\134/localhost\
> > > > 13
> > > > 4@
> > > > TE
> > > > ST.COM@X-CACHECONF: in cache
> > > > FILE:kerby-kerb/kerb-kdc-test/target/tmp/test-tkt.cc
> > > > 2017-05-04T20:44:06 set-error: -1765328243: Did not find 
> > > > credential for krb5_ccache_conf_data/lkdc-hostname@X-CACHECONF: 
> > > > in cache FILE:kerby-kerb/kerb-kdc-test/target/tmp/test-tkt.cc
> > > > 2017-05-04T20:44:06 set-error: -1765328243: Did not find 
> > > > credential for krb5_ccache_conf_data/sitename@X-CACHECONF: in 
> > > > cache FILE:kerby-kerb/kerb-kdc-test/target/tmp/test-tkt.cc
> > > > 2017-05-04T20:44:06 set-error: -1765328243: Did not find 
> > > > credential for test-service/localh...@test.com in cache 
> > > > FILE:kerby-kerb/kerb-kdc-test/target/tmp/test-tkt.cc
> > > > 2017-05-04T20:44:06 set-error: -1765328234: Encryption type 
> > > > des-cbc-md5-deprecated not supported
> > > > 2017-05-04T20:44:06 set-error: -1765328234: Encryption type 
> > > > des-cbc-md4-deprecated not supported
> > > > 2017-05-04T20:44:06 set-error: -1765328234: Encryption type 
> > > > des-cbc-crc-deprecated not supported
> > > > 2017-05-04T20:44:06 Trying to find service kdc for realm 
> > > > TEST.COM flags 0
> > > > 2017-05-04T20:44:06 configuration file for realm TEST.COM found
> > > > 2017-05-04T20:44:06 submissing new requests to new host
> > > > 2017-05-04T20:44:06 host_create: setting hostname localhost
> > > > 2017-05-04T20:44:06 connecting to host: udp ::1:52534 
> > > > (localhost)
> tid:
> > > > 00000001
> > > > 2017-05-04T20:44:06 host_create: setting hostname localhost
> > > > 2017-05-04T20:44:06 Queuing host in future (in 3s), its the 2 
> > > > address on the same name: udp 127.0.0.1:52534 (localhost) tid:
> > > > 00000002
> > > > 2017-05-04T20:44:06 writing packet: udp ::1:52534 (localhost) tid:
> > > > 00000001
> > > > 2017-05-04T20:44:06 reading packet: udp ::1:52534 (localhost) tid:
> > > > 00000001
> > > > 2017-05-04T20:44:06 host completed: udp ::1:52534 (localhost) tid:
> > > > 00000001
> > > > 2017-05-04T20:44:06 krb5_sendto_context TEST.COM done: 0 hosts 1 
> > > > packets 1 wc: 0.048927 nr: 0.000932 kh: 0.000814 tid: 00000002
> > > > 2017-05-04T20:44:06 tkt: extract key 17/763641F3
> > > > 2017-05-04T20:44:06 set-error: -1765328353: Decrypt integrity 
> > > > check failed for checksum type hmac-sha1-96-aes128, key type
> > > > aes128-cts-hmac-sha1-96
> > > > 2017-05-04T20:44:06 tkt: extract key 17/3084A95C
> > > > 2017-05-04T20:44:06 krb5_get_credentials_with_flags: TEST.COM wc:
> > > > 0.050317
> > > > 2017-05-04T20:44:06 set-error: -1765328243: Did not find 
> > > > credential for krb5_ccache_conf_data/realm-config@X-CACHECONF: 
> > > > in cache FILE:kerby-kerb/kerb-kdc-test/target/tmp/test-tkt.cc
> > > > 2017-05-04T20:44:06 set-error: -1765328243: Did not find 
> > > > credential for 
> > > > krb5_ccache_conf_data/time-offset/test-service\134/
> localhost\134@TEST.
> > > > COM@X-CACHECONF: in cache
> > > > FILE:kerby-kerb/kerb-kdc-test/target/tmp/test-tkt.cc
> > > > 2017-05-04T20:44:06 Setting up PFS for auth context
> > > > 2017-05-04T20:44:06 set-error: -1765328234: Encryption type 
> > > > des-cbc-md5-deprecated not supported
> > > > 2017-05-04T20:44:06 set-error: -1765328234: Encryption type 
> > > > des-cbc-md4-deprecated not supported
> > > > 2017-05-04T20:44:06 set-error: -1765328234: Encryption type 
> > > > des-cbc-crc-deprecated not supported First 
> > > > kerberos.authGSSClientStep successful
> > > >
> > > > Thanks
> > > > Jiajia
> > > >
> > > > -----Original Message-----
> > > > From: Zheng, Kai [mailto:kai.zh...@intel.com]
> > > > Sent: Wednesday, May 3, 2017 7:29 PM
> > > > To: kerby@directory.apache.org
> > > > Subject: RE: MIT Kerberos compatibility
> > > >
> > > > Hi Marc,
> > > >
> > > > In case you're not aware of this, please check out the latest 
> > > > fix made
> > > by Jiajia. We thought your case may be different, but would be 
> > > good to have a check before we can repeat/fix your case. Thanks.
> > > > https://issues.apache.org/jira/browse/DIRKRB-625
> > > >
> > > > Regards,
> > > > Kai
> > > >
> > > > -----Original Message-----
> > > > From: Marc de Lignie [mailto:m.c.delig...@xs4all.nl]
> > > > Sent: Sunday, April 30, 2017 7:45 PM
> > > > To: kerby@directory.apache.org
> > > > Subject: Re: MIT Kerberos compatibility
> > > >
> > > > Hi Kai,
> > > >
> > > > The terminal output below is for the latest MIT Kerberos 1.15.1 
> > > > (locally
> > > built on Ubuntu Xenial). Before that, I also tested with the 
> > > default Xenial MIT Kerberos packages (1.13.2), with the same 
> > > result. I did not try earlier MIT Kerberos versions.
> > > >
> > > > Marc
> > > >
> > > > Op 29-04-17 om 21:42 schreef Marc de Lignie:
> > > >> Hi Kai,
> > > >>
> > > >> Thanks for the response. I prepared a minimal config that 
> > > >> reproduces my problem.
> > > >>
> > > >> You can fetch the branch/commit from:
> > > >> https://github.com/vtslab/directory-kerby/commits/MitIssue
> > > >>
> > > >> This is relative to RC2, but I also tried this on trunk for my 
> > > >> actual project.
> > > >>
> > > >> This config produces the debug and error messages below.
> > > >>
> > > >> 1. For the terminal with the bash + python script $ klist 
> > > >> Ticket
> > > >> cache: FILE:kerby-kerb/kerb-kdc-test/target/tmp/test-tkt.cc
> > > >> Default principal: dran...@test.com
> > > >>
> > > >> Valid starting     Expires            Service principal
> > > >> 29-04-17 21:07:39  30-04-17 05:07:39  krbtgt/test....@test.com
> > > >>      renew until 29-04-17 21:07:39
> > > >>
> > > >> $ .
> > > >> kerby-kerb/kerb-kdc-test/src/test/java/org/apache/kerby/kerbero
> > > >> s/ ke rb / server/MitIssueTest.sh [15538] 1493491231.917606:
> > > >> Retrieving dran...@test.com from 
> > > >> FILE:/etc/krb5/user/1000/client.keytab (vno 0, enctype 0) with
> > > >> result:
> > > >> 2/Key table file '/etc/krb5/user/1000/client.keytab' not found 
> > > >> [15538]
> > > >> 1493491231.917827: Retrieving dran...@test.com from 
> > > >> FILE:/etc/krb5/user/1000/client.keytab (vno 0, enctype 0) with
> > result:
> > > >> 2/Key table file '/etc/krb5/user/1000/client.keytab' not found 
> > > >> kerberos.authGSSClientInit successful [15538] 1493491231.918185:
> > > >> Getting credentials dran...@test.com -> test-service/localhost@ 
> > > >> using ccache 
> > > >> FILE:kerby-kerb/kerb-kdc-test/target/tmp/test-tkt.cc
> > > >> [15538] 1493491231.918210: Retrieving dran...@test.com -> 
> > > >> test-service/localhost@ from 
> > > >> FILE:kerby-kerb/kerb-kdc-test/target/tmp/test-tkt.cc with result:
> > > >> -1765328243/Matching credential not found (filename:
> > > >> kerby-kerb/kerb-kdc-test/target/tmp/test-tkt.cc)
> > > >> [15538] 1493491231.918226: Retrying dran...@test.com -> 
> > > >> test-service/localh...@test.com with result: 
> > > >> -1765328243/Matching credential not found (filename:
> > > >> kerby-kerb/kerb-kdc-test/target/tmp/test-tkt.cc)
> > > >> [15538] 1493491231.918229: Server has referral realm; starting 
> > > >> with test-service/localh...@test.com [15538] 1493491231.918278:
> > > >> Retrieving dran...@test.com -> krbtgt/test....@test.com from 
> > > >> FILE:kerby-kerb/kerb-kdc-test/target/tmp/test-tkt.cc with result:
> > > >> 0/Success
> > > >> [15538] 1493491231.918281: Starting with TGT for client realm:
> > > >> dran...@test.com -> krbtgt/test....@test.com [15538]
> > > >> 1493491231.918301: Requesting tickets for 
> > > >> test-service/localh...@test.com, referrals on [15538]
> > > >> 1493491231.918326: Generated subkey for TGS request:
> > > >> aes128-cts/FA30
> > > >> [15538] 1493491231.918359: etypes requested in TGS request:
> > > >> aes256-cts, aes128-cts, aes256-sha2, aes128-sha2, 
> > > >> des3-cbc-sha1, rc4-hmac, camellia128-cts, camellia256-cts 
> > > >> [15538]
> 1493491231.918484:
> > > >> Encoding request body and padata into FAST request [15538]
> > > >> 1493491231.918541: Sending request (836 bytes) to TEST.COM 
> > > >> [15538]
> > > >> 1493491231.918597: Resolving hostname localhost [15538]
> > > >> 1493491231.918703: Initiating TCP connection to stream
> > > >> 127.0.0.1:44292
> > > >> [15538] 1493491231.918777: Sending TCP request to stream
> > > >> 127.0.0.1:44292 [15538] 1493491231.922803: TCP error receiving 
> > > >> from stream
> > > >> 127.0.0.1:44292: 104/Connection reset by peer [15538]
> > > >> 1493491231.922812: Terminating TCP connection to stream
> > > >> 127.0.0.1:44292
> > > >> [15538] 1493491231.922858: Sending initial UDP request to dgram
> > > >> 127.0.0.1:44292
> > > >> ('First kerberos.authGSSClientStep not successful', 
> > > >> GSSError(('Unspecified GSS failure.  Minor code may provide 
> > > >> more information', 851968), ("Cannot contact any KDC for realm 
> > > >> 'TEST.COM'",
> > > >> -1765328228)))
> > > >>
> > > >> 2. For the terminal that runs mvn clean test 
> > > >> -Dtest=MitIssueTest Running 
> > > >> org.apache.kerby.kerberos.kerb.server.MitIssueTest
> > > >> 2017-04-29 21:07:39,182 DEBUG [main] backend.
> AbstractIdentityBackend:
> > > >> initialize called
> > > >> 2017-04-29 21:07:39,195 DEBUG [main] backend.
> AbstractIdentityBackend:
> > > >> getIdentity called, principalName = krbtgt/test....@test.com
> > > >> 2017-04-29 21:07:39,195 DEBUG [main] backend.
> AbstractIdentityBackend:
> > > >> getIdentity failed, principalName = krbtgt/test....@test.com
> > > >> 2017-04-29 21:07:39,212 DEBUG [main] backend.
> AbstractIdentityBackend:
> > > >> addIdentity successful, principalName = 
> > > >> krbtgt/test....@test.com
> > > >> 2017-04-29 21:07:39,212 DEBUG [main] backend.
> AbstractIdentityBackend:
> > > >> getIdentity called, principalName = kadmin/test....@test.com
> > > >> 2017-04-29 21:07:39,212 DEBUG [main] backend.
> AbstractIdentityBackend:
> > > >> getIdentity failed, principalName = kadmin/test....@test.com
> > > >> 2017-04-29 21:07:39,213 DEBUG [main] backend.
> AbstractIdentityBackend:
> > > >> addIdentity successful, principalName = 
> > > >> kadmin/test....@test.com
> > > >> 2017-04-29 21:07:39,216 DEBUG [main] backend.
> AbstractIdentityBackend:
> > > >> start called
> > > >> 2017-04-29 21:07:39,232 DEBUG [main] backend.
> AbstractIdentityBackend:
> > > >> addIdentity successful, principalName = 
> > > >> test-service/localh...@test.com
> > > >> 2017-04-29 21:07:39,425 DEBUG [main] backend.
> AbstractIdentityBackend:
> > > >> addIdentity successful, principalName = dran...@test.com
> > > >> 2017-04-29 21:07:39,465 DEBUG [pool-1-thread-1]
> > > >> backend.AbstractIdentityBackend: getIdentity called, 
> > > >> principalName = krbtgt/test....@test.com
> > > >> 2017-04-29 21:07:39,465 DEBUG [pool-1-thread-1]
> > > >> backend.AbstractIdentityBackend: getIdentity successful, 
> > > >> principalName = krbtgt/test....@test.com
> > > >> 2017-04-29 21:07:39,465 INFO  [pool-1-thread-1] request.KdcRequest:
> > > >> Client entry is empty.
> > > >> 2017-04-29 21:07:39,465 DEBUG [pool-1-thread-1]
> > > >> backend.AbstractIdentityBackend: getIdentity called, 
> > > >> principalName = dran...@test.com
> > > >> 2017-04-29 21:07:39,465 DEBUG [pool-1-thread-1]
> > > >> backend.AbstractIdentityBackend: getIdentity successful, 
> > > >> principalName = dran...@test.com
> > > >> 2017-04-29 21:07:39,465 DEBUG [pool-1-thread-1]
> > > >> backend.AbstractIdentityBackend: getIdentity called, 
> > > >> principalName = krbtgt/test....@test.com
> > > >> 2017-04-29 21:07:39,465 DEBUG [pool-1-thread-1]
> > > >> backend.AbstractIdentityBackend: getIdentity successful, 
> > > >> principalName = krbtgt/test....@test.com
> > > >> 2017-04-29 21:07:39,476 DEBUG [pool-1-thread-1]
> > > >> impl.DefaultKdcHandler: Transport or decoding error occurred, 
> > > >> disconnecting abnormally java.io.EOFException
> > > >>      at java.io.DataInputStream.readInt(DataInputStream.java:392)
> > > >>      at
> > > >> org.apache.kerby.kerberos.kerb.transport.KrbTcpTransport.
> > > receiveMessage(KrbTcpTransport.java:54)
> > > >>      at
> > > >> org.apache.kerby.kerberos.kerb.server.impl.DefaultKdcHandler.ru
> > > >> n(
> > > DefaultKdcHandler.java:46)
> > > >>      at
> > > >> java.util.concurrent.ThreadPoolExecutor.runWorker(
> > > ThreadPoolExecutor.java:1142)
> > > >>      at
> > > >> java.util.concurrent.ThreadPoolExecutor$Worker.run(
> > > ThreadPoolExecutor.java:617)
> > > >>      at java.lang.Thread.run(Thread.java:748)
> > > >> 2017-04-29 21:07:39,477 INFO  [main] client.KrbClientBase:
> > > >> Storing the tgt to the credential cache file.
> > > >> 2017-04-29 21:07:39,491 DEBUG [main] backend.
> AbstractIdentityBackend:
> > > >> getIdentity called, principalName = 
> > > >> test-service/localh...@test.com
> > > >> 2017-04-29 21:07:39,491 DEBUG [main] backend.
> AbstractIdentityBackend:
> > > >> getIdentity successful, principalName = 
> > > >> test-service/localh...@test.com
> > > >> 2017-04-29 21:07:39,498 DEBUG [pool-1-thread-1]
> > > >> backend.AbstractIdentityBackend: getIdentity called, 
> > > >> principalName = krbtgt/test....@test.com
> > > >> 2017-04-29 21:07:39,498 DEBUG [pool-1-thread-1]
> > > >> backend.AbstractIdentityBackend: getIdentity successful, 
> > > >> principalName = krbtgt/test....@test.com
> > > >> 2017-04-29 21:07:39,498 INFO  [pool-1-thread-1] request.KdcRequest:
> > > >> Client entry is empty.
> > > >> 2017-04-29 21:07:39,499 DEBUG [pool-1-thread-1]
> > > >> backend.AbstractIdentityBackend: getIdentity called, 
> > > >> principalName = test-service/localh...@test.com
> > > >> 2017-04-29 21:07:39,499 DEBUG [pool-1-thread-1]
> > > >> backend.AbstractIdentityBackend: getIdentity successful, 
> > > >> principalName = test-service/localh...@test.com
> > > >> 2017-04-29 21:07:39,499 DEBUG [pool-1-thread-1]
> > > >> backend.AbstractIdentityBackend: getIdentity called, 
> > > >> principalName = krbtgt/test....@test.com
> > > >> 2017-04-29 21:07:39,499 DEBUG [pool-1-thread-1]
> > > >> backend.AbstractIdentityBackend: getIdentity successful, 
> > > >> principalName = krbtgt/test....@test.com
> > > >> 2017-04-29 21:07:39,499 INFO  [pool-1-thread-1] request.KdcRequest:
> > > >> The preauth data is empty.
> > > >> 2017-04-29 21:07:39,501 INFO  [pool-1-thread-1] server.KdcHandler:
> > > >> KRB error occurred while processing request:Additional 
> > > >> pre-authentication required
> > > >> 2017-04-29 21:07:39,502 DEBUG [pool-1-thread-1]
> > > >> impl.DefaultKdcHandler: Transport or decoding error occurred, 
> > > >> disconnecting abnormally java.io.EOFException
> > > >>      at java.io.DataInputStream.readInt(DataInputStream.java:392)
> > > >>      at
> > > >> org.apache.kerby.kerberos.kerb.transport.KrbTcpTransport.
> > > receiveMessage(KrbTcpTransport.java:54)
> > > >>      at
> > > >> org.apache.kerby.kerberos.kerb.server.impl.DefaultKdcHandler.ru
> > > >> n(
> > > DefaultKdcHandler.java:46)
> > > >>      at
> > > >> java.util.concurrent.ThreadPoolExecutor.runWorker(
> > > ThreadPoolExecutor.java:1142)
> > > >>      at
> > > >> java.util.concurrent.ThreadPoolExecutor$Worker.run(
> > > ThreadPoolExecutor.java:617)
> > > >>      at java.lang.Thread.run(Thread.java:748)
> > > >> 2017-04-29 21:07:39,505 DEBUG [pool-1-thread-1]
> > > >> backend.AbstractIdentityBackend: getIdentity called, 
> > > >> principalName = krbtgt/test....@test.com
> > > >> 2017-04-29 21:07:39,505 DEBUG [pool-1-thread-1]
> > > >> backend.AbstractIdentityBackend: getIdentity successful, 
> > > >> principalName = krbtgt/test....@test.com
> > > >> 2017-04-29 21:07:39,505 INFO  [pool-1-thread-1] request.KdcRequest:
> > > >> Client entry is empty.
> > > >> 2017-04-29 21:07:39,506 DEBUG [pool-1-thread-1]
> > > >> backend.AbstractIdentityBackend: getIdentity called, 
> > > >> principalName = test-service/localh...@test.com
> > > >> 2017-04-29 21:07:39,506 DEBUG [pool-1-thread-1]
> > > >> backend.AbstractIdentityBackend: getIdentity successful, 
> > > >> principalName = test-service/localh...@test.com
> > > >> 2017-04-29 21:07:39,506 DEBUG [pool-1-thread-1]
> > > >> backend.AbstractIdentityBackend: getIdentity called, 
> > > >> principalName = krbtgt/test....@test.com
> > > >> 2017-04-29 21:07:39,506 DEBUG [pool-1-thread-1]
> > > >> backend.AbstractIdentityBackend: getIdentity successful, 
> > > >> principalName = krbtgt/test....@test.com
> > > >> 2017-04-29 21:07:39,510 DEBUG [pool-1-thread-1]
> > > >> impl.DefaultKdcHandler: Transport or decoding error occurred, 
> > > >> disconnecting abnormally java.io.EOFException
> > > >>      at java.io.DataInputStream.readInt(DataInputStream.java:392)
> > > >>      at
> > > >> org.apache.kerby.kerberos.kerb.transport.KrbTcpTransport.
> > > receiveMessage(KrbTcpTransport.java:54)
> > > >>      at
> > > >> org.apache.kerby.kerberos.kerb.server.impl.DefaultKdcHandler.ru
> > > >> n(
> > > DefaultKdcHandler.java:46)
> > > >>      at
> > > >> java.util.concurrent.ThreadPoolExecutor.runWorker(
> > > ThreadPoolExecutor.java:1142)
> > > >>      at
> > > >> java.util.concurrent.ThreadPoolExecutor$Worker.run(
> > > ThreadPoolExecutor.java:617)
> > > >>      at java.lang.Thread.run(Thread.java:748)
> > > >> 2017-04-29 21:07:55,602 DEBUG [pool-1-thread-1]
> > > >> backend.AbstractIdentityBackend: getIdentity called, 
> > > >> principalName = krbtgt/test....@test.com
> > > >> 2017-04-29 21:07:55,602 DEBUG [pool-1-thread-1]
> > > >> backend.AbstractIdentityBackend: getIdentity successful, 
> > > >> principalName = krbtgt/test....@test.com
> > > >> 2017-04-29 21:07:55,602 INFO  [pool-1-thread-1] request.KdcRequest:
> > > >> Found fast padata and start to process it.
> > > >> 2017-04-29 21:07:55,603 ERROR [pool-1-thread-1]
> > > >> impl.DefaultKdcHandler: Error occured while processing request:
> > > >> org.apache.kerby.kerberos.kerb.KrbException: Decoding failed
> > > >>      at org.apache.kerby.kerberos.kerb.KrbCodec.decode(KrbCodec.
> > > java:85)
> > > >>      at org.apache.kerby.kerberos.kerb.KrbCodec.decode(KrbCodec.
> > > java:70)
> > > >>      at
> > > >> org.apache.kerby.kerberos.kerb.server.request.KdcRequest.kdcFin
> > > >> dF
> > > >> as
> > > >> t(
> > > KdcRequest.java:208)
> > > >>      at
> > > >> org.apache.kerby.kerberos.kerb.server.request.
> > > KdcRequest.process(KdcRequest.java:168)
> > > >>      at
> > > >> org.apache.kerby.kerberos.kerb.server.KdcHandler.
> > > handleMessage(KdcHandler.java:115)
> > > >>      at
> > > >> org.apache.kerby.kerberos.kerb.server.impl.DefaultKdcHandler.
> > > handleMessage(DefaultKdcHandler.java:67)
> > > >>      at
> > > >> org.apache.kerby.kerberos.kerb.server.impl.DefaultKdcHandler.ru
> > > >> n(
> > > DefaultKdcHandler.java:52)
> > > >>      at
> > > >> java.util.concurrent.ThreadPoolExecutor.runWorker(
> > > ThreadPoolExecutor.java:1142)
> > > >>      at
> > > >> java.util.concurrent.ThreadPoolExecutor$Worker.run(
> > > ThreadPoolExecutor.java:617)
> > > >>      at java.lang.Thread.run(Thread.java:748)
> > > >> Caused by: java.io.IOException: Unexpected item context [0] 
> > > >> [tag=0xA0, off=0, len=3+207], expecting 0x30
> > > >>      at
> > > >> org.apache.kerby.asn1.type.Asn1Encodeable.decode(
> > > Asn1Encodeable.java:210)
> > > >>      at
> > > >> org.apache.kerby.asn1.type.Asn1Encodeable.decode(
> > > Asn1Encodeable.java:197)
> > > >>      at org.apache.kerby.kerberos.kerb.KrbCodec.decode(KrbCodec.
> > > java:83)
> > > >>      ... 9 more
> > > >> 2017-04-29 21:07:55,604 DEBUG [pool-1-thread-1]
> > > >> impl.DefaultKdcHandler: Transport or decoding error occurred, 
> > > >> disconnecting abnormally
> > > >> java.net.SocketException: Socket closed
> > > >>      at java.net.SocketInputStream.socketRead0(Native Method)
> > > >>      at java.net.SocketInputStream.socketRead(SocketInputStream.
> > > java:116)
> > > >>      at java.net.SocketInputStream.read(SocketInputStream.java:171)
> > > >>      at java.net.SocketInputStream.read(SocketInputStream.java:141)
> > > >>      at java.net.SocketInputStream.read(SocketInputStream.java:224)
> > > >>      at java.io.DataInputStream.readInt(DataInputStream.java:387)
> > > >>      at
> > > >> org.apache.kerby.kerberos.kerb.transport.KrbTcpTransport.
> > > receiveMessage(KrbTcpTransport.java:54)
> > > >>      at
> > > >> org.apache.kerby.kerberos.kerb.server.impl.DefaultKdcHandler.ru
> > > >> n(
> > > DefaultKdcHandler.java:46)
> > > >>      at
> > > >> java.util.concurrent.ThreadPoolExecutor.runWorker(
> > > ThreadPoolExecutor.java:1142)
> > > >>      at
> > > >> java.util.concurrent.ThreadPoolExecutor$Worker.run(
> > > ThreadPoolExecutor.java:617)
> > > >>      at java.lang.Thread.run(Thread.java:748)
> > > >>
> > > >> In a FreeIPA environment these python lines "just" work.
> > > >>
> > > >> Any suggestions are welcome!
> > > >>
> > > >> Marc
> > > >>
> > > >>
> > > > --
> > > > Marc de Lignie
> > > >
> > >
> > > --
> > > Marc de Lignie
> > >
> > >
> >
> >
> > --
> > Colm O hEigeartaigh
> >
> > Talend Community Coder
> > http://coders.talend.com
> >
>
>
>
> --
> Colm O hEigeartaigh
>
> Talend Community Coder
> http://coders.talend.com
>



--
Colm O hEigeartaigh

Talend Community Coder
http://coders.talend.com

Reply via email to