thing about dtruss is you need to be root, so you'll have to make sure you
got tickets as root.

i would have suggested tcpdump port 53 or port 88
but i guess dtruss will tell us what's up


On Thu, Jul 31, 2014 at 3:16 PM, Andrew Deason <adea...@sinenomine.net>
wrote:

> On Thu, 31 Jul 2014 20:27:13 +0200
> Marcus Crestani <crest...@informatik.uni-tuebingen.de> wrote:
>
> > We are using OS X's Kerberos.  And aklog uses the correct ccache, since
> > aklog is able to obtain a token once the AFS service principal is in the
> > ccache (manually added via kgetcred, for example).  It is just not able
> > to obtain the AFS service principal, for us it doesn't even talk to our
> > KDC.
>
> If you find yourself at a dead end, you could try running 'dtruss' to at
> least see if it's trying to send packets anywhere, or see what config
> files it is reading, if that helps tell you what is going on. e.g.:
>
> # dtruss -a -f 'aklog -d' 2>/tmp/somefile
>
> It would be better to have KRB5_TRACE-style tracing, or debugging
> messages via the krb5.conf 'logging' section, but I'm not sure if
> anything like that works on OS X (I can't get them to do anything on my
> 10.7 machine, but I'm not looking very hard).
>
> dtruss doesn't seem to interpret arguments for a lot of calls (like,
> say, the networking ones), but it's possible to extract more information
> with more dtrace scripting, if you want to go down that route.
>
> --
> Andrew Deason
> adea...@sinenomine.net
>
> _______________________________________________
> OpenAFS-devel mailing list
> OpenAFS-devel@openafs.org
> https://lists.openafs.org/mailman/listinfo/openafs-devel
>
>


-- 
D

Reply via email to