Hi Sumit I followed your instructions to the letter and managed to log on with a smart card twice. Then on the third attempt it failed. This is what the krb5_child.log looks like:
(2021-05-22 21:39:08): [krb5_child[12908]] [main] (0x0400): krb5_child started. (2021-05-22 21:39:08): [krb5_child[12908]] [unpack_buffer] (0x1000): total buffer size: [208] (2021-05-22 21:39:08): [krb5_child[12908]] [unpack_buffer] (0x0100): cmd [241 (auth)] uid [57249832] gid [57200513] validate [true] enterprise principal [true] offline [false] UPN [usern...@xxxxx.xxxxx.net] (2021-05-22 21:39:08): [krb5_child[12908]] [unpack_buffer] (0x0100): ccname: [KCM:] old_ccname: [KCM:] keytab: [/etc/krb5.keytab] (2021-05-22 21:39:08): [krb5_child[12908]] [check_use_fast] (0x0100): Not using FAST. (2021-05-22 21:39:08): [krb5_child[12908]] [switch_creds] (0x0200): Switch user to [57249832][57200513]. (2021-05-22 21:39:08): [krb5_child[12908]] [switch_creds] (0x0200): Switch user to [0][0]. (2021-05-22 21:39:08): [krb5_child[12908]] [k5c_check_old_ccache] (0x4000): Ccache_file is [KCM:] and is not active and TGT is valid. (2021-05-22 21:39:08): [krb5_child[12908]] [k5c_precreate_ccache] (0x4000): Recreating ccache (2021-05-22 21:39:08): [krb5_child[12908]] [privileged_krb5_setup] (0x0080): Cannot open the PAC responder socket (2021-05-22 21:39:08): [krb5_child[12908]] [switch_creds] (0x0200): Switch user to [0][0]. (2021-05-22 21:39:08): [krb5_child[12908]] [switch_creds] (0x0200): Already user [0]. (2021-05-22 21:39:08): [krb5_child[12908]] [main] (0x2000): Running as [0][0]. (2021-05-22 21:39:08): [krb5_child[12908]] [set_lifetime_options] (0x0100): No specific renewable lifetime requested. (2021-05-22 21:39:08): [krb5_child[12908]] [set_lifetime_options] (0x0100): No specific lifetime requested. (2021-05-22 21:39:08): [krb5_child[12908]] [set_canonicalize_option] (0x0100): Canonicalization is set to [true] (2021-05-22 21:39:08): [krb5_child[12908]] [main] (0x0400): Will perform auth (2021-05-22 21:39:08): [krb5_child[12908]] [main] (0x0400): Will perform online auth (2021-05-22 21:39:08): [krb5_child[12908]] [tgt_req_child] (0x1000): Attempting to get a TGT (2021-05-22 21:39:08): [krb5_child[12908]] [get_and_save_tgt] (0x4000): Found Smartcard credentials, trying pkinit. (2021-05-22 21:39:08): [krb5_child[12908]] [get_pkinit_identity] (0x4000): Got [IDPrime (basic)][/usr/lib64/pkcs11/libiidp11.so]. (2021-05-22 21:39:08): [krb5_child[12908]] [get_pkinit_identity] (0x4000): Using pkinit identity [PKCS11:module_name=/usr/lib64/pkcs11/libiidp11.so:token=IDPrime (basic):certid=C0538C6C20E35F51:certlabel=Letth Gary]. (2021-05-22 21:39:08): [krb5_child[12908]] [get_and_save_tgt] (0x0400): Attempting kinit for realm [XXXXX.XXXXX.NET] (2021-05-22 21:39:08): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712348.775336: Getting initial credentials for USERNAME\@xxxxx.xxxxx....@xxxxx.xxxxx.net (2021-05-22 21:39:08): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712348.775338: Sending unauthenticated request (2021-05-22 21:39:08): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712348.775339: Sending request (236 bytes) to XXXXX.XXXXX.NET (2021-05-22 21:39:08): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712348.775340: Initiating TCP connection to stream 192.168.0.1:88 (2021-05-22 21:39:08): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712348.775341: Sending TCP request to stream 192.168.0.1:88 (2021-05-22 21:39:08): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712348.775342: Received answer (207 bytes) from stream 192.168.0.1:88 (2021-05-22 21:39:08): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712348.775343: Terminating TCP connection to stream 192.168.0.1:88 (2021-05-22 21:39:08): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712348.775344: Response was from master KDC (2021-05-22 21:39:08): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712348.775345: Received error from KDC: -1765328359/Additional pre-authentication required (2021-05-22 21:39:08): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712348.775348: Preauthenticating using KDC method data (2021-05-22 21:39:08): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712348.775349: Processing preauth types: PA-PK-AS-REQ (16), PA-PK-AS-REP_OLD (15), PA-ETYPE-INFO2 (19), PA-ENC-TIMESTAMP (2) (2021-05-22 21:39:08): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712348.775350: Selected etype info: etype aes256-cts, salt "XXXXX.XXXXX.NETUSERNAME", params "" (2021-05-22 21:39:09): [krb5_child[12908]] [sss_krb5_responder] (0x4000): Got question [pkinit]. (2021-05-22 21:39:09): [krb5_child[12908]] [answer_pkinit] (0x4000): [0] Identity [PKCS11:module_name=/usr/lib64/pkcs11/libiidp11.so:slotid=1:token=IDPrime (basic)] flags [0]. (2021-05-22 21:39:09): [krb5_child[12908]] [answer_pkinit] (0x4000): Setting pkinit_prompting. (2021-05-22 21:39:09): [krb5_child[12908]] [pkinit_identity_matches] (0x4000): Found [module_name=/usr/lib64/pkcs11/libiidp11.so] in identity [PKCS11:module_name=/usr/lib64/pkcs11/libiidp11.so:slotid=1:token=IDPrime (basic)]. (2021-05-22 21:39:09): [krb5_child[12908]] [pkinit_identity_matches] (0x4000): Found [token=IDPrime (basic)] in identity [PKCS11:module_name=/usr/lib64/pkcs11/libiidp11.so:slotid=1:token=IDPrime (basic)]. (2021-05-22 21:39:09): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712349.768786: PKINIT loading CA certs and CRLs from FILE (2021-05-22 21:39:09): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712349.768787: PKINIT client computed kdc-req-body checksum 9/861AA32FA35DD352DACB3D5768D2818B64B99735 (2021-05-22 21:39:09): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712349.768789: PKINIT client making DH request (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619245: Preauth module pkinit (16) (real) returned: 0/Success (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619246: Produced preauth for next request: PA-PK-AS-REQ (16) (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619247: Sending request (5547 bytes) to XXXXX.XXXXX.NET (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619248: Initiating TCP connection to stream 192.168.0.1:88 (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619249: Sending TCP request to stream 192.168.0.1:88 (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619250: Received answer (4924 bytes) from stream 192.168.0.1:88 (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619251: Terminating TCP connection to stream 192.168.0.1:88 (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619252: Response was from master KDC (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619253: Processing preauth types: PA-PK-AS-REP (17) (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619254: PKINIT client verified DH reply (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619255: PKINIT client config accepts KDC dNSName SAN dc01.xxxxx.xxxxx.net (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619256: PKINIT client found dNSName SAN in KDC cert: dc01.xxxxx.xxxxx.net (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619257: PKINIT client matched KDC hostname dc01.xxxxx.xxxxx.net against dNSName SAN; EKU check still required (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619258: PKINIT client skipping EKU check due to configuration (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619259: PKINIT client found acceptable EKU in KDC cert (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619260: PKINIT client used octetstring2key to compute reply key aes256-cts/7D0E (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619261: Preauth module pkinit (17) (real) returned: 0/Success (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619262: Produced preauth for next request: (empty) (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619263: AS key determined by preauth: aes256-cts/7D0E (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619264: Decrypted AS reply; session key is: aes256-cts/A2ED (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619265: FAST negotiation: unavailable (2021-05-22 21:39:10): [krb5_child[12908]] [sss_krb5_expire_callback_func] (0x2000): exp_time: [514796935] (2021-05-22 21:39:10): [krb5_child[12908]] [validate_tgt] (0x2000): Found keytab entry with the realm of the credential. (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619266: Retrieving COMPUTERNAME$@XXXXX.XXXXX.NET from MEMORY:/etc/krb5.keytab (vno 0, enctype 0) with result: 0/Success (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619267: Resolving unique ccache of type MEMORY (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619268: Initializing MEMORY:4eV88Mr with default princ usern...@xxxxx.xxxxx.net (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619269: Storing usern...@xxxxx.xxxxx.net -> krbtgt/xxxxx.xxxxx....@xxxxx.xxxxx.net in MEMORY:4eV88Mr (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619270: Getting credentials usern...@xxxxx.xxxxx.net -> COMPUTERNAME$@XXXXX.XXXXX.NET using ccache MEMORY:4eV88Mr (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619271: Retrieving usern...@xxxxx.xxxxx.net -> COMPUTERNAME$@XXXXX.XXXXX.NET from MEMORY:4eV88Mr with result: -1765328243/Matching credential not found (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619272: Retrieving usern...@xxxxx.xxxxx.net -> krbtgt/xxxxx.xxxxx....@xxxxx.xxxxx.net from MEMORY:4eV88Mr with result: 0/Success (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619273: Starting with TGT for client realm: usern...@xxxxx.xxxxx.net -> krbtgt/xxxxx.xxxxx....@xxxxx.xxxxx.net (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619274: Requesting tickets for COMPUTERNAME$@XXXXX.XXXXX.NET, referrals on (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619275: Generated subkey for TGS request: aes256-cts/258D (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619276: etypes requested in TGS request: aes256-cts, aes256-sha2, camellia256-cts, aes128-cts, aes128-sha2, camellia128-cts, rc4-hmac (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619278: Encoding request body and padata into FAST request (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619279: Sending request (2445 bytes) to XXXXX.XXXXX.NET (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619280: Initiating TCP connection to stream 192.168.0.1:88 (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619281: Sending TCP request to stream 192.168.0.1:88 (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619282: Received answer (2497 bytes) from stream 192.168.0.1:88 (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619283: Terminating TCP connection to stream 192.168.0.1:88 (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619284: Response was from master KDC (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619285: Decoding FAST response (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619286: FAST reply key: aes256-cts/A0F1 (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619287: TGS reply is for usern...@xxxxx.xxxxx.net -> COMPUTERNAME$@XXXXX.XXXXX.NET with session key aes256-cts/26D3 (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619288: TGS request result: 0/Success (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619289: Received creds for desired service COMPUTERNAME$@XXXXX.XXXXX.NET (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619290: Storing usern...@xxxxx.xxxxx.net -> COMPUTERNAME$@XXXXX.XXXXX.NET in MEMORY:4eV88Mr (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619291: Creating authenticator for usern...@xxxxx.xxxxx.net -> COMPUTERNAME$@XXXXX.XXXXX.NET, seqnum 0, subkey (null), session key aes256-cts/26D3 (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619293: Retrieving COMPUTERNAME$@XXXXX.XXXXX.NET from MEMORY:/etc/krb5.keytab (vno 2, enctype aes256-cts) with result: 0/Success (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619294: Decrypted AP-REQ with specified server principal COMPUTERNAME$@XXXXX.XXXXX.NET: aes256-cts/0FD8 (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619295: AP-REQ ticket: usern...@xxxxx.xxxxx.net -> COMPUTERNAME$@XXXXX.XXXXX.NET, session key aes256-cts/26D3 (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619296: Negotiated enctype based on authenticator: aes256-cts (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619297: Initializing MEMORY:rd_req2 with default princ usern...@xxxxx.xxxxx.net (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619298: Storing usern...@xxxxx.xxxxx.net -> COMPUTERNAME$@XXXXX.XXXXX.NET in MEMORY:rd_req2 (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619299: Destroying ccache MEMORY:4eV88Mr (2021-05-22 21:39:10): [krb5_child[12908]] [validate_tgt] (0x0400): TGT verified using key for [COMPUTERNAME$@XXXXX.XXXXX.NET]. (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619300: Retrieving usern...@xxxxx.xxxxx.net -> COMPUTERNAME$@XXXXX.XXXXX.NET from MEMORY:rd_req2 with result: 0/Success (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619301: Retrieving COMPUTERNAME$@XXXXX.XXXXX.NET from MEMORY:/etc/krb5.keytab (vno 2, enctype aes256-cts) with result: 0/Success (2021-05-22 21:39:10): [krb5_child[12908]] [sss_send_pac] (0x0040): sss_pac_make_request failed [-1][2]. (2021-05-22 21:39:10): [krb5_child[12908]] [validate_tgt] (0x0040): sss_send_pac failed, group membership for user with principal [USERNAME\@xxxxx.xxxxx....@xxxxx.xxxxx.net] might not be correct. (2021-05-22 21:39:10): [krb5_child[12908]] [sss_child_krb5_trace_cb] (0x4000): [12908] 1621712350.619302: Destroying ccache MEMORY:rd_req2 (2021-05-22 21:39:10): [krb5_child[12908]] [become_user] (0x0200): Trying to become user [57249832][57200513]. (2021-05-22 21:39:10): [krb5_child[12908]] [get_and_save_tgt] (0x2000): Running as [57249832][57200513]. (2021-05-22 21:39:10): [krb5_child[12908]] [sss_get_ccache_name_for_principal] (0x4000): Location: [KCM:] (2021-05-22 21:39:10): [krb5_child[12908]] [sss_get_ccache_name_for_principal] (0x4000): tmp_ccname: [KCM:57249832:57728] (2021-05-22 21:39:10): [krb5_child[12908]] [create_ccache] (0x4000): Initializing ccache of type [KCM] (2021-05-22 21:39:10): [krb5_child[12908]] [create_ccache] (0x4000): CC supports switch (2021-05-22 21:39:10): [krb5_child[12908]] [create_ccache] (0x4000): returning: 0 (2021-05-22 21:39:10): [krb5_child[12908]] [safe_remove_old_ccache_file] (0x0400): New and old ccache file are the same, none will be deleted. (2021-05-22 21:39:10): [krb5_child[12908]] [k5c_send_data] (0x0200): Received error code 0 (2021-05-22 21:39:10): [krb5_child[12908]] [pack_response_packet] (0x2000): response packet size: [117] (2021-05-22 21:39:10): [krb5_child[12908]] [k5c_send_data] (0x4000): Response sent. (2021-05-22 21:39:10): [krb5_child[12908]] [main] (0x0400): krb5_child completed successfully (2021-05-22 21:41:01): [krb5_child[14076]] [main] (0x0400): krb5_child started. (2021-05-22 21:41:01): [krb5_child[14076]] [unpack_buffer] (0x1000): total buffer size: [208] (2021-05-22 21:41:01): [krb5_child[14076]] [unpack_buffer] (0x0100): cmd [241 (auth)] uid [57249832] gid [57200513] validate [true] enterprise principal [true] offline [false] UPN [usern...@xxxxx.xxxxx.net] (2021-05-22 21:41:01): [krb5_child[14076]] [unpack_buffer] (0x0100): ccname: [KCM:] old_ccname: [KCM:] keytab: [/etc/krb5.keytab] (2021-05-22 21:41:01): [krb5_child[14076]] [check_use_fast] (0x0100): Not using FAST. (2021-05-22 21:41:01): [krb5_child[14076]] [switch_creds] (0x0200): Switch user to [57249832][57200513]. (2021-05-22 21:41:01): [krb5_child[14076]] [switch_creds] (0x0200): Switch user to [0][0]. (2021-05-22 21:41:01): [krb5_child[14076]] [k5c_check_old_ccache] (0x4000): Ccache_file is [KCM:] and is not active and TGT is valid. (2021-05-22 21:41:01): [krb5_child[14076]] [k5c_precreate_ccache] (0x4000): Recreating ccache (2021-05-22 21:41:01): [krb5_child[14076]] [privileged_krb5_setup] (0x0080): Cannot open the PAC responder socket (2021-05-22 21:41:01): [krb5_child[14076]] [switch_creds] (0x0200): Switch user to [0][0]. (2021-05-22 21:41:01): [krb5_child[14076]] [switch_creds] (0x0200): Already user [0]. (2021-05-22 21:41:01): [krb5_child[14076]] [main] (0x2000): Running as [0][0]. (2021-05-22 21:41:01): [krb5_child[14076]] [set_lifetime_options] (0x0100): No specific renewable lifetime requested. (2021-05-22 21:41:01): [krb5_child[14076]] [set_lifetime_options] (0x0100): No specific lifetime requested. (2021-05-22 21:41:01): [krb5_child[14076]] [set_canonicalize_option] (0x0100): Canonicalization is set to [true] (2021-05-22 21:41:01): [krb5_child[14076]] [main] (0x0400): Will perform auth (2021-05-22 21:41:01): [krb5_child[14076]] [main] (0x0400): Will perform online auth (2021-05-22 21:41:01): [krb5_child[14076]] [tgt_req_child] (0x1000): Attempting to get a TGT (2021-05-22 21:41:01): [krb5_child[14076]] [get_and_save_tgt] (0x4000): Found Smartcard credentials, trying pkinit. (2021-05-22 21:41:01): [krb5_child[14076]] [get_pkinit_identity] (0x4000): Got [IDPrime (basic)][/usr/lib64/pkcs11/libiidp11.so]. (2021-05-22 21:41:01): [krb5_child[14076]] [get_pkinit_identity] (0x4000): Using pkinit identity [PKCS11:module_name=/usr/lib64/pkcs11/libiidp11.so:token=IDPrime (basic):certid=C0538C6C20E35F51:certlabel=Letth Gary]. (2021-05-22 21:41:01): [krb5_child[14076]] [get_and_save_tgt] (0x0400): Attempting kinit for realm [XXXXX.XXXXX.NET] (2021-05-22 21:41:01): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712461.047593: Getting initial credentials for USERNAME\@xxxxx.xxxxx....@xxxxx.xxxxx.net (2021-05-22 21:41:01): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712461.047595: Sending unauthenticated request (2021-05-22 21:41:01): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712461.047596: Sending request (236 bytes) to XXXXX.XXXXX.NET (2021-05-22 21:41:01): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712461.047597: Initiating TCP connection to stream 192.168.0.1:88 (2021-05-22 21:41:01): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712461.047598: Sending TCP request to stream 192.168.0.1:88 (2021-05-22 21:41:01): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712461.047599: Received answer (207 bytes) from stream 192.168.0.1:88 (2021-05-22 21:41:01): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712461.047600: Terminating TCP connection to stream 192.168.0.1:88 (2021-05-22 21:41:01): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712461.047601: Response was from master KDC (2021-05-22 21:41:01): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712461.047602: Received error from KDC: -1765328359/Additional pre-authentication required (2021-05-22 21:41:01): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712461.047605: Preauthenticating using KDC method data (2021-05-22 21:41:01): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712461.047606: Processing preauth types: PA-PK-AS-REQ (16), PA-PK-AS-REP_OLD (15), PA-ETYPE-INFO2 (19), PA-ENC-TIMESTAMP (2) (2021-05-22 21:41:01): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712461.047607: Selected etype info: etype aes256-cts, salt "XXXXX.XXXXX.NETUSERNAME", params "" (2021-05-22 21:41:01): [krb5_child[14076]] [sss_krb5_responder] (0x4000): Got question [pkinit]. (2021-05-22 21:41:01): [krb5_child[14076]] [answer_pkinit] (0x4000): [0] Identity [PKCS11:module_name=/usr/lib64/pkcs11/libiidp11.so:slotid=1:token=IDPrime (basic)] flags [0]. (2021-05-22 21:41:01): [krb5_child[14076]] [answer_pkinit] (0x4000): Setting pkinit_prompting. (2021-05-22 21:41:01): [krb5_child[14076]] [pkinit_identity_matches] (0x4000): Found [module_name=/usr/lib64/pkcs11/libiidp11.so] in identity [PKCS11:module_name=/usr/lib64/pkcs11/libiidp11.so:slotid=1:token=IDPrime (basic)]. (2021-05-22 21:41:01): [krb5_child[14076]] [pkinit_identity_matches] (0x4000): Found [token=IDPrime (basic)] in identity [PKCS11:module_name=/usr/lib64/pkcs11/libiidp11.so:slotid=1:token=IDPrime (basic)]. (2021-05-22 21:41:02): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712462.113658: PKINIT loading CA certs and CRLs from FILE (2021-05-22 21:41:02): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712462.113659: PKINIT client computed kdc-req-body checksum 9/7A29DFAFC36D5337CCEB5A5B130F568C75C79506 (2021-05-22 21:41:02): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712462.113661: PKINIT client making DH request (2021-05-22 21:41:02): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712462.113662: Preauth module pkinit (16) (real) returned: 0/Success (2021-05-22 21:41:02): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712462.113663: Produced preauth for next request: PA-PK-AS-REQ (16) (2021-05-22 21:41:02): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712462.113664: Sending request (5547 bytes) to XXXXX.XXXXX.NET (2021-05-22 21:41:02): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712462.113665: Initiating TCP connection to stream 192.168.0.1:88 (2021-05-22 21:41:02): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712462.113666: Sending TCP request to stream 192.168.0.1:88 (2021-05-22 21:41:02): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712462.113667: Received answer (4924 bytes) from stream 192.168.0.1:88 (2021-05-22 21:41:02): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712462.113668: Terminating TCP connection to stream 192.168.0.1:88 (2021-05-22 21:41:02): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712462.113669: Response was from master KDC (2021-05-22 21:41:02): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712462.113670: Processing preauth types: PA-PK-AS-REP (17) (2021-05-22 21:41:02): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712462.113671: PKINIT client verified DH reply (2021-05-22 21:41:02): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712462.113672: PKINIT client config accepts KDC dNSName SAN dc01.xxxxx.xxxxx.net (2021-05-22 21:41:02): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712462.113673: PKINIT client found dNSName SAN in KDC cert: dc01.xxxxx.xxxxx.net (2021-05-22 21:41:02): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712462.113674: PKINIT client matched KDC hostname dc01.xxxxx.xxxxx.net against dNSName SAN; EKU check still required (2021-05-22 21:41:02): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712462.113675: PKINIT client skipping EKU check due to configuration (2021-05-22 21:41:02): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712462.113676: PKINIT client found acceptable EKU in KDC cert (2021-05-22 21:41:02): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712462.113677: PKINIT client used octetstring2key to compute reply key aes256-cts/EA76 (2021-05-22 21:41:02): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712462.113678: Preauth module pkinit (17) (real) returned: 0/Success (2021-05-22 21:41:02): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712462.113679: Produced preauth for next request: (empty) (2021-05-22 21:41:02): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712462.113680: AS key determined by preauth: aes256-cts/EA76 (2021-05-22 21:41:02): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712462.113681: Decrypted AS reply; session key is: aes256-cts/F057 (2021-05-22 21:41:02): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712462.113682: FAST negotiation: unavailable (2021-05-22 21:41:02): [krb5_child[14076]] [sss_krb5_expire_callback_func] (0x2000): exp_time: [514796823] (2021-05-22 21:41:02): [krb5_child[14076]] [validate_tgt] (0x2000): Found keytab entry with the realm of the credential. (2021-05-22 21:41:02): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712462.113683: Retrieving COMPUTERNAME$@XXXXX.XXXXX.NET from MEMORY:/etc/krb5.keytab (vno 0, enctype 0) with result: 0/Success (2021-05-22 21:41:02): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712462.113684: Resolving unique ccache of type MEMORY (2021-05-22 21:41:02): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712462.113685: Initializing MEMORY:Rhk7ok0 with default princ usern...@xxxxx.xxxxx.net (2021-05-22 21:41:02): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712462.113686: Storing usern...@xxxxx.xxxxx.net -> krbtgt/xxxxx.xxxxx....@xxxxx.xxxxx.net in MEMORY:Rhk7ok0 (2021-05-22 21:41:02): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712462.113687: Getting credentials usern...@xxxxx.xxxxx.net -> COMPUTERNAME$@XXXXX.XXXXX.NET using ccache MEMORY:Rhk7ok0 (2021-05-22 21:41:02): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712462.113688: Retrieving usern...@xxxxx.xxxxx.net -> COMPUTERNAME$@XXXXX.XXXXX.NET from MEMORY:Rhk7ok0 with result: -1765328243/Matching credential not found (2021-05-22 21:41:02): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712462.113689: Retrieving usern...@xxxxx.xxxxx.net -> krbtgt/xxxxx.xxxxx....@xxxxx.xxxxx.net from MEMORY:Rhk7ok0 with result: 0/Success (2021-05-22 21:41:02): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712462.113690: Starting with TGT for client realm: usern...@xxxxx.xxxxx.net -> krbtgt/xxxxx.xxxxx....@xxxxx.xxxxx.net (2021-05-22 21:41:02): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712462.113691: Requesting tickets for COMPUTERNAME$@XXXXX.XXXXX.NET, referrals on (2021-05-22 21:41:02): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712462.113692: Generated subkey for TGS request: aes256-cts/9265 (2021-05-22 21:41:02): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712462.113693: etypes requested in TGS request: aes256-cts, aes256-sha2, camellia256-cts, aes128-cts, aes128-sha2, camellia128-cts, rc4-hmac (2021-05-22 21:41:02): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712462.113695: Encoding request body and padata into FAST request (2021-05-22 21:41:02): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712462.113696: Sending request (2445 bytes) to XXXXX.XXXXX.NET (2021-05-22 21:41:02): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712462.113697: Initiating TCP connection to stream 192.168.0.1:88 (2021-05-22 21:41:02): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712462.113698: Sending TCP request to stream 192.168.0.1:88 (2021-05-22 21:41:03): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712463.010634: Received answer (2497 bytes) from stream 192.168.0.1:88 (2021-05-22 21:41:03): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712463.010635: Terminating TCP connection to stream 192.168.0.1:88 (2021-05-22 21:41:03): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712463.010636: Response was from master KDC (2021-05-22 21:41:03): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712463.010637: Decoding FAST response (2021-05-22 21:41:03): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712463.010638: FAST reply key: aes256-cts/4627 (2021-05-22 21:41:03): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712463.010639: TGS reply is for usern...@xxxxx.xxxxx.net -> COMPUTERNAME$@XXXXX.XXXXX.NET with session key aes256-cts/AAF1 (2021-05-22 21:41:03): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712463.010640: TGS request result: 0/Success (2021-05-22 21:41:03): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712463.010641: Received creds for desired service COMPUTERNAME$@XXXXX.XXXXX.NET (2021-05-22 21:41:03): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712463.010642: Storing usern...@xxxxx.xxxxx.net -> COMPUTERNAME$@XXXXX.XXXXX.NET in MEMORY:Rhk7ok0 (2021-05-22 21:41:03): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712463.010643: Creating authenticator for usern...@xxxxx.xxxxx.net -> COMPUTERNAME$@XXXXX.XXXXX.NET, seqnum 0, subkey (null), session key aes256-cts/AAF1 (2021-05-22 21:41:03): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712463.010645: Retrieving COMPUTERNAME$@XXXXX.XXXXX.NET from MEMORY:/etc/krb5.keytab (vno 2, enctype aes256-cts) with result: 0/Success (2021-05-22 21:41:03): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712463.010646: Decrypted AP-REQ with specified server principal COMPUTERNAME$@XXXXX.XXXXX.NET: aes256-cts/0FD8 (2021-05-22 21:41:03): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712463.010647: AP-REQ ticket: usern...@xxxxx.xxxxx.net -> COMPUTERNAME$@XXXXX.XXXXX.NET, session key aes256-cts/AAF1 (2021-05-22 21:41:03): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712463.010648: Negotiated enctype based on authenticator: aes256-cts (2021-05-22 21:41:03): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712463.010649: Initializing MEMORY:rd_req2 with default princ usern...@xxxxx.xxxxx.net (2021-05-22 21:41:03): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712463.010650: Storing usern...@xxxxx.xxxxx.net -> COMPUTERNAME$@XXXXX.XXXXX.NET in MEMORY:rd_req2 (2021-05-22 21:41:03): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712463.010651: Destroying ccache MEMORY:Rhk7ok0 (2021-05-22 21:41:03): [krb5_child[14076]] [validate_tgt] (0x0400): TGT verified using key for [COMPUTERNAME$@XXXXX.XXXXX.NET]. (2021-05-22 21:41:03): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712463.010652: Retrieving usern...@xxxxx.xxxxx.net -> COMPUTERNAME$@XXXXX.XXXXX.NET from MEMORY:rd_req2 with result: 0/Success (2021-05-22 21:41:03): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712463.010653: Retrieving COMPUTERNAME$@XXXXX.XXXXX.NET from MEMORY:/etc/krb5.keytab (vno 2, enctype aes256-cts) with result: 0/Success (2021-05-22 21:41:03): [krb5_child[14076]] [sss_send_pac] (0x0040): sss_pac_make_request failed [-1][2]. (2021-05-22 21:41:03): [krb5_child[14076]] [validate_tgt] (0x0040): sss_send_pac failed, group membership for user with principal [USERNAME\@xxxxx.xxxxx....@xxxxx.xxxxx.net] might not be correct. (2021-05-22 21:41:03): [krb5_child[14076]] [sss_child_krb5_trace_cb] (0x4000): [14076] 1621712463.010654: Destroying ccache MEMORY:rd_req2 (2021-05-22 21:41:03): [krb5_child[14076]] [become_user] (0x0200): Trying to become user [57249832][57200513]. (2021-05-22 21:41:03): [krb5_child[14076]] [get_and_save_tgt] (0x2000): Running as [57249832][57200513]. (2021-05-22 21:41:03): [krb5_child[14076]] [sss_get_ccache_name_for_principal] (0x4000): Location: [KCM:] (2021-05-22 21:41:03): [krb5_child[14076]] [sss_get_ccache_name_for_principal] (0x4000): tmp_ccname: [KCM:57249832:57728] (2021-05-22 21:41:03): [krb5_child[14076]] [create_ccache] (0x4000): Initializing ccache of type [KCM] (2021-05-22 21:41:03): [krb5_child[14076]] [create_ccache] (0x4000): CC supports switch (2021-05-22 21:41:03): [krb5_child[14076]] [create_ccache] (0x4000): returning: 0 (2021-05-22 21:41:03): [krb5_child[14076]] [safe_remove_old_ccache_file] (0x0400): New and old ccache file are the same, none will be deleted. (2021-05-22 21:41:03): [krb5_child[14076]] [k5c_send_data] (0x0200): Received error code 0 (2021-05-22 21:41:03): [krb5_child[14076]] [pack_response_packet] (0x2000): response packet size: [117] (2021-05-22 21:41:03): [krb5_child[14076]] [k5c_send_data] (0x4000): Response sent. (2021-05-22 21:41:03): [krb5_child[14076]] [main] (0x0400): krb5_child completed successfully (2021-05-22 22:01:51): [krb5_child[21961]] [main] (0x0400): krb5_child started. (2021-05-22 22:01:51): [krb5_child[21961]] [unpack_buffer] (0x1000): total buffer size: [208] (2021-05-22 22:01:51): [krb5_child[21961]] [unpack_buffer] (0x0100): cmd [241 (auth)] uid [57249832] gid [57200513] validate [true] enterprise principal [true] offline [false] UPN [usern...@xxxxx.xxxxx.net] (2021-05-22 22:01:51): [krb5_child[21961]] [unpack_buffer] (0x0100): ccname: [KCM:] old_ccname: [KCM:] keytab: [/etc/krb5.keytab] (2021-05-22 22:01:51): [krb5_child[21961]] [check_use_fast] (0x0100): Not using FAST. (2021-05-22 22:01:51): [krb5_child[21961]] [switch_creds] (0x0200): Switch user to [57249832][57200513]. (2021-05-22 22:01:51): [krb5_child[21961]] [switch_creds] (0x0200): Switch user to [0][0]. (2021-05-22 22:01:51): [krb5_child[21961]] [k5c_check_old_ccache] (0x4000): Ccache_file is [KCM:] and is not active and TGT is valid. (2021-05-22 22:01:51): [krb5_child[21961]] [k5c_precreate_ccache] (0x4000): Recreating ccache (2021-05-22 22:01:51): [krb5_child[21961]] [privileged_krb5_setup] (0x0080): Cannot open the PAC responder socket (2021-05-22 22:01:51): [krb5_child[21961]] [switch_creds] (0x0200): Switch user to [0][0]. (2021-05-22 22:01:51): [krb5_child[21961]] [switch_creds] (0x0200): Already user [0]. (2021-05-22 22:01:51): [krb5_child[21961]] [main] (0x2000): Running as [0][0]. (2021-05-22 22:01:51): [krb5_child[21961]] [set_lifetime_options] (0x0100): No specific renewable lifetime requested. (2021-05-22 22:01:51): [krb5_child[21961]] [set_lifetime_options] (0x0100): No specific lifetime requested. (2021-05-22 22:01:51): [krb5_child[21961]] [set_canonicalize_option] (0x0100): Canonicalization is set to [true] (2021-05-22 22:01:51): [krb5_child[21961]] [main] (0x0400): Will perform auth (2021-05-22 22:01:51): [krb5_child[21961]] [main] (0x0400): Will perform online auth (2021-05-22 22:01:51): [krb5_child[21961]] [tgt_req_child] (0x1000): Attempting to get a TGT (2021-05-22 22:01:51): [krb5_child[21961]] [get_and_save_tgt] (0x4000): Found Smartcard credentials, trying pkinit. (2021-05-22 22:01:51): [krb5_child[21961]] [get_pkinit_identity] (0x4000): Got [IDPrime (basic)][/usr/lib64/pkcs11/libiidp11.so]. (2021-05-22 22:01:51): [krb5_child[21961]] [get_pkinit_identity] (0x4000): Using pkinit identity [PKCS11:module_name=/usr/lib64/pkcs11/libiidp11.so:token=IDPrime (basic):certid=C0538C6C20E35F51:certlabel=Letth Gary]. (2021-05-22 22:01:51): [krb5_child[21961]] [get_and_save_tgt] (0x0400): Attempting kinit for realm [XXXXX.XXXXX.NET] (2021-05-22 22:01:51): [krb5_child[21961]] [sss_child_krb5_trace_cb] (0x4000): [21961] 1621713711.008243: Getting initial credentials for USERNAME\@xxxxx.xxxxx....@xxxxx.xxxxx.net (2021-05-22 22:01:51): [krb5_child[21961]] [sss_child_krb5_trace_cb] (0x4000): [21961] 1621713711.008245: Sending unauthenticated request (2021-05-22 22:01:51): [krb5_child[21961]] [sss_child_krb5_trace_cb] (0x4000): [21961] 1621713711.008246: Sending request (236 bytes) to XXXXX.XXXXX.NET (2021-05-22 22:01:51): [krb5_child[21961]] [sss_child_krb5_trace_cb] (0x4000): [21961] 1621713711.008247: Initiating TCP connection to stream 192.168.0.2:88 (2021-05-22 22:01:51): [krb5_child[21961]] [sss_child_krb5_trace_cb] (0x4000): [21961] 1621713711.008248: Sending TCP request to stream 192.168.0.2:88 (2021-05-22 22:01:51): [krb5_child[21961]] [sss_child_krb5_trace_cb] (0x4000): [21961] 1621713711.008249: Received answer (207 bytes) from stream 192.168.0.2:88 (2021-05-22 22:01:51): [krb5_child[21961]] [sss_child_krb5_trace_cb] (0x4000): [21961] 1621713711.008250: Terminating TCP connection to stream 192.168.0.2:88 (2021-05-22 22:01:51): [krb5_child[21961]] [sss_child_krb5_trace_cb] (0x4000): [21961] 1621713711.008251: Response was from master KDC (2021-05-22 22:01:51): [krb5_child[21961]] [sss_child_krb5_trace_cb] (0x4000): [21961] 1621713711.008252: Received error from KDC: -1765328359/Additional pre-authentication required (2021-05-22 22:01:51): [krb5_child[21961]] [sss_child_krb5_trace_cb] (0x4000): [21961] 1621713711.008255: Preauthenticating using KDC method data (2021-05-22 22:01:51): [krb5_child[21961]] [sss_child_krb5_trace_cb] (0x4000): [21961] 1621713711.008256: Processing preauth types: PA-PK-AS-REQ (16), PA-PK-AS-REP_OLD (15), PA-ETYPE-INFO2 (19), PA-ENC-TIMESTAMP (2) (2021-05-22 22:01:51): [krb5_child[21961]] [sss_child_krb5_trace_cb] (0x4000): [21961] 1621713711.008257: Selected etype info: etype aes256-cts, salt "XXXXX.XXXXX.NETUSERNAME", params "" (2021-05-22 22:01:51): [krb5_child[21961]] [sss_krb5_responder] (0x4000): Got question [pkinit]. (2021-05-22 22:01:51): [krb5_child[21961]] [answer_pkinit] (0x4000): [0] Identity [PKCS11:module_name=/usr/lib64/pkcs11/libiidp11.so:slotid=1:token=IDPrime (basic)] flags [0]. (2021-05-22 22:01:51): [krb5_child[21961]] [answer_pkinit] (0x4000): Setting pkinit_prompting. (2021-05-22 22:01:51): [krb5_child[21961]] [pkinit_identity_matches] (0x4000): Found [module_name=/usr/lib64/pkcs11/libiidp11.so] in identity [PKCS11:module_name=/usr/lib64/pkcs11/libiidp11.so:slotid=1:token=IDPrime (basic)]. (2021-05-22 22:01:51): [krb5_child[21961]] [pkinit_identity_matches] (0x4000): Found [token=IDPrime (basic)] in identity [PKCS11:module_name=/usr/lib64/pkcs11/libiidp11.so:slotid=1:token=IDPrime (basic)]. (2021-05-22 22:01:52): [krb5_child[21961]] [sss_child_krb5_trace_cb] (0x4000): [21961] 1621713712.123177: PKINIT loading CA certs and CRLs from FILE (2021-05-22 22:01:52): [krb5_child[21961]] [sss_child_krb5_trace_cb] (0x4000): [21961] 1621713712.123178: PKINIT client computed kdc-req-body checksum 9/332F3229C5A54EBDD04BD0B31DA11BB162BE5DA9 (2021-05-22 22:01:52): [krb5_child[21961]] [sss_child_krb5_trace_cb] (0x4000): [21961] 1621713712.123180: PKINIT client making DH request (2021-05-22 22:01:52): [krb5_child[21961]] [sss_child_krb5_trace_cb] (0x4000): [21961] 1621713712.123181: Preauth module pkinit (16) (real) returned: 0/Success (2021-05-22 22:01:52): [krb5_child[21961]] [sss_child_krb5_trace_cb] (0x4000): [21961] 1621713712.123182: Produced preauth for next request: PA-PK-AS-REQ (16) (2021-05-22 22:01:52): [krb5_child[21961]] [sss_child_krb5_trace_cb] (0x4000): [21961] 1621713712.123183: Sending request (5547 bytes) to XXXXX.XXXXX.NET (2021-05-22 22:01:52): [krb5_child[21961]] [sss_child_krb5_trace_cb] (0x4000): [21961] 1621713712.123184: Initiating TCP connection to stream 192.168.0.2:88 (2021-05-22 22:01:52): [krb5_child[21961]] [sss_child_krb5_trace_cb] (0x4000): [21961] 1621713712.123185: Sending TCP request to stream 192.168.0.2:88 (2021-05-22 22:01:52): [krb5_child[21961]] [sss_child_krb5_trace_cb] (0x4000): [21961] 1621713712.123186: Received answer (4732 bytes) from stream 192.168.0.2:88 (2021-05-22 22:01:52): [krb5_child[21961]] [sss_child_krb5_trace_cb] (0x4000): [21961] 1621713712.123187: Terminating TCP connection to stream 192.168.0.2:88 (2021-05-22 22:01:52): [krb5_child[21961]] [sss_child_krb5_trace_cb] (0x4000): [21961] 1621713712.123188: Response was from master KDC (2021-05-22 22:01:52): [krb5_child[21961]] [sss_child_krb5_trace_cb] (0x4000): [21961] 1621713712.123189: Processing preauth types: PA-PK-AS-REP (17) (2021-05-22 22:01:52): [krb5_child[21961]] [sss_child_krb5_trace_cb] (0x4000): [21961] 1621713712.123190: PKINIT OpenSSL error: Failed to verify received certificate (depth 0): unable to get local issuer certificate (2021-05-22 22:01:52): [krb5_child[21961]] [sss_child_krb5_trace_cb] (0x4000): [21961] 1621713712.123191: PKINIT client could not verify DH reply (2021-05-22 22:01:52): [krb5_child[21961]] [sss_child_krb5_trace_cb] (0x4000): [21961] 1621713712.123192: Preauth module pkinit (17) (real) returned: -1765328314/Failed to verify received certificate (depth 0): unable to get local issuer certificate (2021-05-22 22:01:52): [krb5_child[21961]] [sss_child_krb5_trace_cb] (0x4000): [21961] 1621713712.123193: Produced preauth for next request: (empty) (2021-05-22 22:01:52): [krb5_child[21961]] [sss_krb5_responder] (0x4000): Got question [password]. (2021-05-22 22:01:52): [krb5_child[21961]] [sss_child_krb5_trace_cb] (0x4000): [21961] 1621713712.123194: Getting AS key, salt "XXXXX.XXXXX.NETUSERNAME", params "" (2021-05-22 22:01:52): [krb5_child[21961]] [sss_krb5_prompter] (0x4000): sss_krb5_prompter name [(null)] banner [(null)] num_prompts [1] EINVAL. (2021-05-22 22:01:52): [krb5_child[21961]] [sss_krb5_prompter] (0x4000): Prompt [0][Password for USERNAME\@xxxxx.xxxxx....@xxxxx.xxxxx.net]. (2021-05-22 22:01:52): [krb5_child[21961]] [sss_krb5_prompter] (0x0200): Prompter interface isn't used for password prompts by SSSD. (2021-05-22 22:01:52): [krb5_child[21961]] [sss_krb5_get_init_creds_password] (0x0020): 1643: [-1765328254][Cannot read password] (2021-05-22 22:01:52): [krb5_child[21961]] [get_and_save_tgt] (0x0020): 1720: [-1765328254][Cannot read password] (2021-05-22 22:01:52): [krb5_child[21961]] [map_krb5_error] (0x0020): 1849: [-1765328254][Cannot read password] (2021-05-22 22:01:52): [krb5_child[21961]] [k5c_send_data] (0x0200): Received error code 1432158219 (2021-05-22 22:01:52): [krb5_child[21961]] [pack_response_packet] (0x2000): response packet size: [4] (2021-05-22 22:01:52): [krb5_child[21961]] [k5c_send_data] (0x4000): Response sent. (2021-05-22 22:01:52): [krb5_child[21961]] [main] (0x0400): krb5_child completed successfully _______________________________________________ sssd-users mailing list -- sssd-users@lists.fedorahosted.org To unsubscribe send an email to sssd-users-le...@lists.fedorahosted.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedorahosted.org/archives/list/sssd-users@lists.fedorahosted.org Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure