Jakub Hrozek wrote on 8/12/16 12:59 AM:
On Thu, Aug 11, 2016 at 03:08:35PM -0700, Robert Moulton wrote:
On a CentOS 6 system we recently implemented sssd auth against an AD domain
(Samba 4 AD, specifically). The system messages log often shows flurries of
these GSSAPI errors:
sssd[be[notarealdomain.com]]: GSSAPI Error: Invalid token was supplied
(Token header is malformed or corrupt)
I'm sorry, I've never seen this error. But what you can do is to kinit
with the keytab using KRB5_TRACE=/dev/stderr and then search the AD
DC/Samba DC with -Y GSSAPI (again prepending KRB5_TRACE=/dev/stderr) and
see if more helpful errors appear.
Thanks for the suggestion Jakub. I tried that. A preauth error was
reported, along with a response-size error, but no corresponding sssd
messages showed up in the system log. Are those errors or anything else
in the output possibly meaningful in this case? The output:
$ KRB5_TRACE=/dev/stderr kinit
[14527] 1471027291.50378: Getting initial credentials for
[email protected]
[14527] 1471027291.58578: Sending request (222 bytes) to NOTAREALDOMAIN.COM
[14527] 1471027291.58857: Sending initial UDP request to dgram
10.95.160.78:88
[14527] 1471027291.66763: Received answer from dgram 10.95.160.78:88
[14527] 1471027291.66834: Response was from master KDC
[14527] 1471027291.66865: Received error from KDC:
-1765328359/Additional pre-authentication required
[14527] 1471027291.66915: Processing preauth types: 16, 15, 2, 11, 19
[14527] 1471027291.66933: Selected etype info: etype rc4-hmac, salt
"(null)", params ""
[14527] 1471027291.66945: Selected etype info: etype rc4-hmac, salt
"(null)", params ""
Password for [email protected]:
[14527] 1471027295.243102: AS key obtained for encrypted timestamp:
rc4-hmac/60BE
[14527] 1471027295.243177: Encrypted timestamp (for 1471027295.243112):
plain 301AA011180F32303136303831323138343133355AA105020303B5A8,
encrypted
E7B719EF8E1A52A5A81C6FF11CB6298FD2F8560A54DD6AE9E25B324541A1F6E4B310EE5EFA20A91C15BA15EB2D71D15BA0E48E9C
[14527] 1471027295.243204: Preauth module encrypted_timestamp (2)
(flags=1) returned: 0/Success
[14527] 1471027295.243212: Produced preauth for next request: 2
[14527] 1471027295.243239: Sending request (298 bytes) to NOTAREALDOMAIN.COM
[14527] 1471027295.243339: Sending initial UDP request to dgram
10.95.160.78:88
[14527] 1471027295.270030: Received answer from dgram 10.95.160.78:88
[14527] 1471027295.270104: Response was from master KDC
[14527] 1471027295.270127: Received error from KDC: -1765328332/Response
too big for UDP, retry with TCP
[14527] 1471027295.270136: Request or response is too big for UDP;
retrying with TCP
[14527] 1471027295.270142: Sending request (298 bytes) to
NOTAREALDOMAIN.COM (tcp only)
[14527] 1471027295.270204: Initiating TCP connection to stream
10.95.160.78:88
[14527] 1471027295.270573: Sending TCP request to stream 10.95.160.78:88
[14527] 1471027295.293462: Received answer from stream 10.95.160.78:88
[14527] 1471027295.293562: Response was from master KDC
[14527] 1471027295.293598: Salt derived from principal:
NOTAREALDOMAIN.COMrmoulton
[14527] 1471027295.293615: AS key determined by preauth: rc4-hmac/60BE
[14527] 1471027295.293667: Decrypted AS reply; session key is: rc4-hmac/319D
[14527] 1471027295.293673: FAST negotiation: unavailable
[14527] 1471027295.293716: Initializing FILE:/tmp/krb5cc_1331_LQ9X0S
with default princ [email protected]
[14527] 1471027295.294014: Removing [email protected] ->
krbtgt/[email protected] from
FILE:/tmp/krb5cc_1331_LQ9X0S
[14527] 1471027295.294029: Storing [email protected] ->
krbtgt/[email protected] in FILE:/tmp/krb5cc_1331_LQ9X0S
bash-4.1$ KRB5_TRACE=/dev/stderr ldapsearch -H ldap://porter -Y GSSAPI
-b dc=notarealdomain,dc=com cn=rmoulton
SASL/GSSAPI authentication started
[16471] 1471027634.101272: ccselect module realm chose cache
FILE:/tmp/krb5cc_1331_LQ9X0S with client principal
[email protected] for server principal
ldap/[email protected]
[16471] 1471027634.101357: Retrieving [email protected] ->
krb5_ccache_conf_data/proxy_impersonator@X-CACHECONF: from
FILE:/tmp/krb5cc_1331_LQ9X0S with result: -1765328243/Matching
credential not found
[16471] 1471027634.101386: Getting credentials
[email protected] ->
ldap/[email protected] using ccache
FILE:/tmp/krb5cc_1331_LQ9X0S
[16471] 1471027634.101439: Retrieving [email protected] ->
ldap/[email protected] from
FILE:/tmp/krb5cc_1331_LQ9X0S with result: -1765328243/Matching
credential not found
[16471] 1471027634.101477: Retrieving [email protected] ->
krbtgt/[email protected] from
FILE:/tmp/krb5cc_1331_LQ9X0S with result: 0/Success
[16471] 1471027634.101487: Found cached TGT for service realm:
[email protected] -> krbtgt/[email protected]
[16471] 1471027634.101496: Requesting tickets for
ldap/[email protected], referrals on
[16471] 1471027634.101543: Generated subkey for TGS request: rc4-hmac/BA52
[16471] 1471027634.101555: etypes requested in TGS request: aes256-cts,
aes128-cts, des3-cbc-sha1, rc4-hmac
[16471] 1471027634.101747: Sending request (1705 bytes) to
NOTAREALDOMAIN.COM
[16471] 1471027634.102072: Initiating TCP connection to stream
10.95.160.78:88
[16471] 1471027634.102417: Sending TCP request to stream 10.95.160.78:88
[16471] 1471027634.119567: Received answer from stream 10.95.160.78:88
[16471] 1471027634.119663: Response was from master KDC
[16471] 1471027634.119726: TGS reply is for [email protected]
-> ldap/[email protected] with session key
rc4-hmac/6537
[16471] 1471027634.119772: TGS request result: 0/Success
[16471] 1471027634.119778: Received creds for desired service
ldap/[email protected]
[16471] 1471027634.119785: Removing [email protected] ->
ldap/[email protected] from
FILE:/tmp/krb5cc_1331_LQ9X0S
[16471] 1471027634.119791: Storing [email protected] ->
ldap/[email protected] in
FILE:/tmp/krb5cc_1331_LQ9X0S
[16471] 1471027634.119921: Creating authenticator for
[email protected] ->
ldap/[email protected], seqnum 706553382,
subkey rc4-hmac/57FE, session key rc4-hmac/6537
[16471] 1471027634.119930: Negotiating for enctypes in authenticator:
aes256-cts, aes128-cts, des3-cbc-sha1, rc4-hmac
[16471] 1471027634.123899: ccselect module realm chose cache
FILE:/tmp/krb5cc_1331_LQ9X0S with client principal
[email protected] for server principal
ldap/[email protected]
[16471] 1471027634.123961: Retrieving [email protected] ->
krb5_ccache_conf_data/proxy_impersonator@X-CACHECONF: from
FILE:/tmp/krb5cc_1331_LQ9X0S with result: -1765328243/Matching
credential not found
[16471] 1471027634.124034: Read AP-REP, time 1471027638.119937, subkey
aes256-cts/02E0, seqnum 255305194
SASL username: [email protected]
SASL SSF: 56
SASL data security layer installed.
# extended LDIF
#
# LDAPv3
# base <dc=notarealdomain,dc=com> with scope subtree
# filter: cn=rmoulton
# requesting: ALL
#
# rmoulton, Users, notarealdomain.com
dn: CN=rmoulton,CN=Users,DC=notarealdomain,DC=com
objectClass: top
objectClass: posixAccount
objectClass: person
objectClass: organizationalPerson
objectClass: user
cn: rmoulton
sn: Moulton
< remaining output snipped >
Any idea what might be wrong? Troubleshooting tips? (We don't have much
experience with sssd, admittedly.)
When the flurries happen, system load increases markedly, and we suspect
that a recent system crash was related.
Our sssd.conf:
----------
[sssd]
services = nss, pam
config_file_version = 2
domains = notarealdomain.com
[nss]
[pam]
[domain/notarealdomain.com]
id_provider = ad
access_provider = ad
ldap_id_mapping=false
krb5_keytab=/etc/krb5.sssd.keytab
----------
thanks in advance,
-r
_______________________________________________
sssd-users mailing list
[email protected]
https://lists.fedorahosted.org/admin/lists/[email protected]
_______________________________________________
sssd-users mailing list
[email protected]
https://lists.fedorahosted.org/admin/lists/[email protected]
_______________________________________________
sssd-users mailing list
[email protected]
https://lists.fedorahosted.org/admin/lists/[email protected]