Brandon S. Allbery KF8NH wrote:
On Jul 17, 2009, at 15:01 , Eric Chris Garrison wrote:
[r...@rufus2 etc]# klist -e
Ticket cache: FILE:/tmp/krb5cc_0
Default principal: afs/[email protected]
Valid starting Expires Service principal
07/17/09 14:34:44 07/18/09 00:34:44 krbtgt/[email protected]
renew until 07/18/09 14:34:44, Etype (skey, tkt): AES-256 CTS
mode with 96-bit SHA-1 HMAC, AES-256 CTS mode with 96-bit SHA-1 HMAC
Er? AES-256 won't work with AFS.
No, that is a tgt to test if kinit works. It looks like it did.
07/17/09 14:38:58 07/18/09 00:38:55 afs/[email protected]
renew until 07/18/09 14:38:51, Etype (skey, tkt): DES cbc mode
with CRC-32, DES cbc mode with RSA-MD5
This is what it should look like.
No, that is what it should look like after an aklog to get the service ticket.
Eric,
Can you run klist -e -t -K -k afstest-md5.keytab
and verify that the key matches what asetkey has.
--
Douglas E. Engert <[email protected]>
Argonne National Laboratory
9700 South Cass Avenue
Argonne, Illinois 60439
(630) 252-5444
_______________________________________________
OpenAFS-info mailing list
[email protected]
https://lists.openafs.org/mailman/listinfo/openafs-info