Hello,

In this particular case, I have an Active Directory KDC from which I have
created host principals and imported them into the proper keytabs. Both sides
of the connection are running OpenSSH_4.3p2 Debian-8ubuntu1, OpenSSL 0.9.8c 05
Sep 2006.

I'm not really sure what the issue here is. I've sucessfully managed to get
this sort of setup working previously with an MIT KDC.

I can sucessfully initiate sec=krb5* NFSv4 connections between the two hosts,
so I'm fairly confident that I managed to export the keytabs from AD properly,
though obviously they utilize the nfs/ principals rather than host/. The
exported keytabs use RC4-HMAC (The AD default).

I'm hoping that I've overlooked something straight forward that someone can
readily point out.

Thanks in advance,
Ed


On the "server" side the following options are set:
   KerberosAuthentication yes
   KerberosOrLocalPasswd yes
   KerberosTicketCleanup yes
   GSSAPIAuthentication yes
   GSSAPICleanupCredentials yes

On the "client" side the following options are set:
   GSSAPIAuthentication yes
   GSSAPIDelegateCredentials yes
   GSSAPITrustDns yes

>From the client, I use "kinit" to obtain the ticket for my user. I then
attempt to SSH into the server. I believe the following is the relevant
portion of a debug session:

Client:
   debug1: Authentications that can continue:
   publickey,gssapi-keyex,gssapi-with-mic,password
   debug3: start over, passed a different list
   publickey,gssapi-keyex,gssapi-with-mic,password
   debug3: preferred
   gssapi-keyex,gssapi-with-mic,gssapi,publickey,keyboard-interactive,password
   debug3: authmethod_lookup gssapi-keyex
   debug3: remaining preferred:
   gssapi-with-mic,gssapi,publickey,keyboard-interactive,password
   debug3: authmethod_is_enabled gssapi-keyex
   debug1: Next authentication method: gssapi-keyex
   debug1: No valid Key exchange context
   debug2: we did not send a packet, disable method
   debug3: authmethod_lookup gssapi-with-mic
   debug3: remaining preferred: gssapi,publickey,keyboard-interactive,password
   debug3: authmethod_is_enabled gssapi-with-mic
   debug1: Next authentication method: gssapi-with-mic
   debug2: we sent a gssapi-with-mic packet, wait for reply
   debug1: Delegating credentials
   debug1: Delegating credentials
   debug1: Miscellaneous failure
   Generic error (see e-text)

Server:
   debug1: userauth-request for user eroper service ssh-connection method none
   debug1: attempt 0 failures 0
   Failed none for eroper from 10.10.130.145 port 60646 ssh2
   Failed none for eroper from 10.10.130.145 port 60646 ssh2
   debug1: userauth-request for user eroper service ssh-connection method
   gssapi-with-mic
   debug1: attempt 1 failures 1
   Postponed gssapi-with-mic for eroper from 10.10.130.145 port 60646 ssh2
   debug1: Miscellaneous failure
   Key table entry not found

   debug1: Got no client credentials
   Failed gssapi-with-mic for eroper from 10.10.130.145 port 60646 ssh2
   debug1: userauth-request for user eroper service ssh-connection method
   gssapi-with-mic
   debug1: attempt 2 failures 2
   Failed gssapi-with-mic for eroper from 10.10.130.145 port 60646 ssh2
   debug1: userauth-request for user eroper service ssh-connection method
   publickey
   debug1: attempt 3 failures 2

On the server:

anubis:~# klist -k
   Keytab name: FILE:/etc/krb5.keytab
   KVNO Principal
   ---- ---------------------------------------------------------
      3 nfs/[EMAIL PROTECTED]
      3 host/[EMAIL PROTECTED]

On the client:

   Ticket cache: FILE:/tmp/krb5cc_10116
   Default principal: [EMAIL PROTECTED]

   Valid starting     Expires            Service principal
   07/23/07 12:35:15  07/23/07 22:35:15  krbtgt/[EMAIL PROTECTED]
           renew until 07/24/07 12:35:15
   07/23/07 12:35:34  07/23/07 22:35:15  host/[EMAIL PROTECTED]
           renew until 07/24/07 12:35:15


   Kerberos 4 ticket cache: /tmp/tkt10116
   klist: You have no tickets cached

Reply via email to