Thanks for your answer Freeman

I already tried the examples you mentioned before but couldn't get them to
work. However, as they seemed to address the problem I was facing I gave
them another try, to no avail.

Until yesterday, after I installed java 7 (java version "1.7.0_03") suddenly
everything was working fine. But as we're deploying our services to WAS
which uses java 6 this is no acceptable solution. 

Maybe someone can help me to get the examples working under java 6 ? Or
point me to some possible working alternatives?

I also stumbled upon the following bug, but I don't think it applies to my
problem: http://bugs.sun.com/bugdatabase/view_bug.do?bug_id=7061379

My configuration:

Source: https://svn.apache.org/repos/asf/cxf/trunk/ 
Redhat Linux server : narvi.sfb
SPN (*): HTTP/_kerbisspoc-service.melkweg.tld
KDC server: corx01.melkweg.tld

(*): both the client & the server use the same SPN

Content of /etc/krb5.conf:

[libdefaults]
default_realm = MELKWEG.TLD

[realms]
MELKWEG.TLD = {
    kdc = corx01.melkweg.tld
}

[domain_realm]
.sfb = MELKWEG.TLD

Content of Login.jaas:

client {
    com.sun.security.auth.module.Krb5LoginModule required
    refreshKrb5Config=true
    useKeyTab=true
    debug=true
    keyTab="/etc/_kerbisspoc.keytab"
    principal="HTTP/_kerbisspoc-service.melkweg.tld@";
};

server {
    com.sun.security.auth.module.Krb5LoginModule required
    debug=true
    refreshKrb5Config=true
    useKeyTab=true
    storeKey=true
    keyTab="/etc/_kerbisspoc.keytab"
    principal="HTTP/[email protected]";
};

Context of client.xml (relevant part):

    <bean id="kerberosValidator"
        class="org.apache.ws.security.validate.KerberosTokenValidator">
        <property name="contextName" value="server"/>
        <property name="serviceName"
value="HTTP/_kerbisspoc-service.melkweg.tld@"/>
    </bean>
   
Context of server.xml (relevant part):

    <jaxws:client
name="{http://www.example.org/contract/DoubleIt}DoubleItKerberosSymmetricPort"; 
                  createdFromAPI="true">
       <jaxws:properties>
           <entry key="ws-security.encryption.properties" 
                 
value="org/apache/cxf/systest/ws/wssec10/client/bob.properties"/> 
           <entry key="ws-security.encryption.username" value="bob"/>
           <entry key="ws-security.kerberos.client">
               <bean
class="org.apache.cxf.ws.security.kerberos.KerberosClient">
                   <constructor-arg ref="cxf"/>
                   <property name="contextName" value="client"/>
                   <property name="serviceName"
value="HTTP/_kerbisspoc-service.melkweg.tld@"/>
               </bean>            
           </entry> 
       </jaxws:properties>
    </jaxws:client>


Command line for the test:

mvn test -Pnochecks -Dsun.security.krb5.debug=true -Dtest=KerberosTokenTest
-Djava.security.auth.login.config=src/test/resources/kerberos.jaas  

Output using version "1.6.0_25":

-------------------------------------------------------
 T E S T S
-------------------------------------------------------

Running org.apache.cxf.systest.ws.kerberos.KerberosTokenTest
In testKerberosOverSymmetric.
Unrestricted policies installed
Debug is  true storeKey false useTicketCache false useKeyTab true
doNotPrompt false ticketCache is null isInitiator true KeyTab is
/etc/_kerbisspoc.keytab refreshKrb5Config is true principal is
HTTP/_kerbisspoc-service.melkweg.tld@ tryFirstPass is false useFirstPass is
false storePass is false clearPass is false
Refreshing Kerberos configuration
Config name: /etc/krb5.conf
>>> KdcAccessibility: reset
>>> KeyTabInputStream, readName(): MELKWEG.TLD
>>> KeyTabInputStream, readName(): HTTP
>>> KeyTabInputStream, readName(): _kerbisspoc-service.melkweg.tld
>>> KeyTab: load() entry length: 83; type: 23
Added key: 23version: 4
Ordering keys wrt default_tkt_enctypes list
Using builtin default etypes for default_tkt_enctypes
default etypes for default_tkt_enctypes: 3 1 23 16 17 18.
principal's key obtained from the keytab
Acquire TGT using AS Exchange
Using builtin default etypes for default_tkt_enctypes
default etypes for default_tkt_enctypes: 3 1 23 16 17 18.
>>> KrbAsReq calling createMessage
>>> KrbAsReq in createMessage
>>> KrbKdcReq send: kdc=corx01.melkweg.tld UDP:88, timeout=30000, number of
>>> retries =3, #bytes=166
>>> KDCCommunication: kdc=corx01.melkweg.tld UDP:88, timeout=30000,Attempt
>>> =1, #bytes=166
>>> KrbKdcReq send: #bytes read=631
>>> KrbKdcReq send: #bytes read=631
>>> KdcAccessibility: remove corx01.melkweg.tld
>>> EType: sun.security.krb5.internal.crypto.ArcFourHmacEType
>>> KrbAsRep cons in KrbAsReq.getReply HTTP/_kerbisspoc-service.melkweg.tld
principal is HTTP/[email protected]
EncryptionKey: keyType=23 keyBytes (hex dump)=0000: E7 F7 BA 95 A4 39 BC C1  
C7 75 22 6B CF 95 B5 E9  .....9...u"k....

Commit Succeeded

Found ticket for HTTP/[email protected] to go to
krbtgt/[email protected] expiring on Thu Apr 26 03:30:36 CEST 2012
Entered Krb5Context.initSecContext with state=STATE_NEW
Found ticket for HTTP/[email protected] to go to
krbtgt/[email protected] expiring on Thu Apr 26 03:30:36 CEST 2012
Service ticket not found in the subject
>>> Credentials acquireServiceCreds: same realm
Using builtin default etypes for default_tgs_enctypes
default etypes for default_tgs_enctypes: 3 1 23 16 17 18.
>>> CksumType: sun.security.krb5.internal.crypto.RsaMd5CksumType
>>> EType: sun.security.krb5.internal.crypto.ArcFourHmacEType
>>> KrbKdcReq send: kdc=corx01.melkweg.tld UDP:88, timeout=30000, number of
>>> retries =3, #bytes=665
>>> KDCCommunication: kdc=corx01.melkweg.tld UDP:88, timeout=30000,Attempt
>>> =1, #bytes=665
>>> KrbKdcReq send: #bytes read=627
>>> KrbKdcReq send: #bytes read=627
>>> KdcAccessibility: remove corx01.melkweg.tld
>>> EType: sun.security.krb5.internal.crypto.ArcFourHmacEType
>>> KrbApReq: APOptions are 00000000 00000000 00000000 00000000
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Krb5Context setting mySeqNumber to: 19043227
Krb5Context setting peerSeqNumber to: 0
Created InitSecContextToken:
0000: 01 00 6E 82 02 1F 30 82   02 1B A0 03 02 01 05 A1  ..n...0.........
0010: 03 02 01 0E A2 07 03 05   00 00 00 00 00 A3 82 01  ................
0020: 2B 61 82 01 27 30 82 01   23 A0 03 02 01 05 A1 0D  +a..'0..#.......
0030: 1B 0B 4D 45 4C 4B 57 45   47 2E 54 4C 44 A2 32 30  ..MELKWEG.TLD.20
0040: 30 A0 03 02 01 00 A1 29   30 27 1B 04 48 54 54 50  0......)0'..HTTP
0050: 1B 1F 5F 6B 65 72 62 74   6F 6D 70 6F 63 2D 73 65  .._kerbtompoc-se
0060: 72 76 69 63 65 2E 6D 65   6C 6B 77 65 67 2E 74 6C  rvice.melkweg.tl
0070: 64 A3 81 D8 30 81 D5 A0   03 02 01 17 A1 03 02 01  d...0...........
0080: 02 A2 81 C8 04 81 C5 4D   9E 3F A3 AD 9D AC 7A 13  .......M.?....z.
0090: 7A FB F5 A5 0A 0A 3C E0   27 53 B3 78 FA 21 7F 30  z.....<.'S.x.!.0
00A0: 38 6D 20 95 B3 27 DA 77   31 00 3D CE 98 36 EA 58  8m ..'.w1.=..6.X
00B0: 39 60 85 44 4C 3B 81 AA   CE EB 2D D6 6B 94 8A 1B  9`.DL;....-.k...
00C0: C3 54 92 A1 18 E0 41 75   2B 78 CE 43 FF 04 5E 64  .T....Au+x.C..^d
00D0: 22 90 AA EC C1 20 62 D9   9F E2 9F 96 BD FB BF 31  ".... b........1
00E0: 37 E3 C5 74 43 E4 F8 44   C1 84 24 51 4F A1 76 10  7..tC..D..$QO.v.
00F0: 70 5E 96 F9 E4 1B D2 28   9D B8 B6 82 CC 7A FA 59  p^.....(.....z.Y
0100: 07 96 0A 1D A7 01 32 09   DA C7 D5 BE AC DE 1A A0  ......2.........
0110: 49 A5 46 3E B6 C2 F1 8C   39 41 7C C4 AA 32 AA 2A  I.F>....9A...2.*
0120: 68 7B 66 0A EF 82 E3 93   A3 0E B0 83 6C 0A 2F 09  h.f.........l./.
0130: 6E D8 59 93 E7 2B 5A 7C   C1 88 C7 D8 1E 27 E4 C2  n.Y..+Z......'..
0140: 61 D9 0A 54 B6 03 9D 85   9A 15 54 55 A4 81 D6 30  a..T......TU...0
0150: 81 D3 A0 03 02 01 03 A2   81 CB 04 81 C8 4E AA 1D  .............N..
0160: 9A 0F 00 61 07 0C FB E7   CE A1 2F 33 D3 74 25 CC  ...a....../3.t%.
0170: 5F 67 E8 89 2A 3A B4 66   71 BB A0 0F F0 E5 83 2A  _g..*:.fq......*
0180: E3 DD 83 0D DE 16 44 C7   A2 6A 76 01 AD 25 04 B8  ......D..jv..%..
0190: D3 25 A0 AF 70 C0 DA BB   F8 36 A5 F9 9F DA 92 BF  .%..p....6......
01A0: D1 27 96 C7 52 3B 13 B7   8F 32 C9 BA 64 E6 0C C2  .'..R;...2..d...
01B0: 2D 60 55 5D 7C 92 7E D7   B9 A6 8B 5C FD 2E FF D6  -`U].......\....
01C0: EA 64 C0 2B 42 3D 09 71   85 BD 65 DE 61 AD 6A 3B  .d.+B=.q..e.a.j;
01D0: F9 1A F6 B2 DD E1 7A 40   98 F1 86 6C CD B9 E2 5B  [email protected]...[
01E0: D6 F2 A5 E8 4E 15 4B 65   0E 38 3F 8C A9 8C FC 97  ....N.Ke.8?.....
01F0: 93 0A 51 70 6F B4 6E CF   E1 67 96 95 B1 08 E6 23  ..Qpo.n..g.....#
0200: BF E9 1B FB 81 18 3B 10   5D 3C 1F 80 55 3A 8E AE  ......;.]<..U:..
0210: EE 5A 70 0A 3A 18 0A 9A   78 83 D5 1B 4D 9F F7 AA  .Zp.:...x...M...
0220: D2 3A 8B 55 B6                                     .:.U.

Debug is  true storeKey true useTicketCache false useKeyTab true doNotPrompt
false ticketCache is null isInitiator true KeyTab is /etc/_kerbisspoc.keytab
refreshKrb5Config is true principal is
HTTP/[email protected] tryFirstPass is false
useFirstPass is false storePass is false clearPass is false
Refreshing Kerberos configuration
Config name: /etc/krb5.conf
Refreshing Keytab
>>> KdcAccessibility: reset
>>> KeyTabInputStream, readName(): MELKWEG.TLD
>>> KeyTabInputStream, readName(): HTTP
>>> KeyTabInputStream, readName(): _kerbisspoc-service.melkweg.tld
>>> KeyTab: load() entry length: 83; type: 23
Added key: 23version: 4
Ordering keys wrt default_tkt_enctypes list
Using builtin default etypes for default_tkt_enctypes
default etypes for default_tkt_enctypes: 3 1 23 16 17 18.
principal's key obtained from the keytab
Acquire TGT using AS Exchange
Using builtin default etypes for default_tkt_enctypes
default etypes for default_tkt_enctypes: 3 1 23 16 17 18.
>>> KrbAsReq calling createMessage
>>> KrbAsReq in createMessage
>>> KrbKdcReq send: kdc=corx01.melkweg.tld UDP:88, timeout=30000, number of
>>> retries =3, #bytes=166
>>> KDCCommunication: kdc=corx01.melkweg.tld UDP:88, timeout=30000,Attempt
>>> =1, #bytes=166
>>> KrbKdcReq send: #bytes read=631
>>> KrbKdcReq send: #bytes read=631
>>> KdcAccessibility: remove corx01.melkweg.tld
>>> EType: sun.security.krb5.internal.crypto.ArcFourHmacEType
>>> KrbAsRep cons in KrbAsReq.getReply HTTP/_kerbisspoc-service.melkweg.tld
principal is HTTP/[email protected]
EncryptionKey: keyType=23 keyBytes (hex dump)=0000: E7 F7 BA 95 A4 39 BC C1  
C7 75 22 6B CF 95 B5 E9  .....9...u"k....

Added server's keyKerberos Principal
HTTP/[email protected] Version 4key
EncryptionKey: keyType=23 keyBytes (hex dump)=
0000: E7 F7 BA 95 A4 39 BC C1   C7 75 22 6B CF 95 B5 E9  .....9...u"k....

        [Krb5LoginModule] added Krb5Principal 
HTTP/[email protected] to Subject
Commit Succeeded

Tests run: 12, Failures: 0, Errors: 1, Skipped: 11, Time elapsed: 11.529 sec
<<< FAILURE!
testKerberosOverSymmetric(org.apache.cxf.systest.ws.kerberos.KerberosTokenTest) 
Time elapsed: 4.094 sec  <<< ERROR!
javax.xml.ws.soap.SOAPFaultException: General security error (An error
occurred in trying to validate a ticket)
    at
org.apache.cxf.jaxws.JaxWsClientProxy.invoke(JaxWsClientProxy.java:156)
    at $Proxy42.doubleIt(Unknown Source)
    at
org.apache.cxf.systest.ws.kerberos.KerberosTokenTest.testKerberosOverSymmetric(KerberosTokenTest.java:131)
    at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
    at
sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:39)
    at
sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25)
    at java.lang.reflect.Method.invoke(Method.java:597)
    at
org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:44)
    at
org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:15)
    at
org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:41)
    at
org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:20)
    at
org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:31)
    at
org.junit.runners.BlockJUnit4ClassRunner.runNotIgnored(BlockJUnit4ClassRunner.java:79)
    at
org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:71)
    at
org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:49)
    at org.junit.runners.ParentRunner$3.run(ParentRunner.java:193)
    at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:52)
    at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:191)
    at org.junit.runners.ParentRunner.access$000(ParentRunner.java:42)
    at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:184)
    at
org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:28)
    at
org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:31)
    at org.junit.runners.ParentRunner.run(ParentRunner.java:236)
    at
org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:236)
    at
org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:134)
    at
org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:113)
    at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
    at
sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:39)
    at
sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25)
    at java.lang.reflect.Method.invoke(Method.java:597)
    at
org.apache.maven.surefire.util.ReflectionUtils.invokeMethodWithArray(ReflectionUtils.java:189)
    at
org.apache.maven.surefire.booter.ProviderFactory$ProviderProxy.invoke(ProviderFactory.java:165)
    at
org.apache.maven.surefire.booter.ProviderFactory.invokeProvider(ProviderFactory.java:85)
    at
org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:103)
    at
org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:74)
Caused by: org.apache.cxf.binding.soap.SoapFault: General security error (An
error occurred in trying to validate a ticket)
    at
org.apache.cxf.binding.soap.interceptor.Soap11FaultInInterceptor.unmarshalFault(Soap11FaultInInterceptor.java:75)
    at
org.apache.cxf.binding.soap.interceptor.Soap11FaultInInterceptor.handleMessage(Soap11FaultInInterceptor.java:46)
    at
org.apache.cxf.binding.soap.interceptor.Soap11FaultInInterceptor.handleMessage(Soap11FaultInInterceptor.java:35)
    at
org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:262)
    at
org.apache.cxf.interceptor.AbstractFaultChainInitiatorObserver.onMessage(AbstractFaultChainInitiatorObserver.java:113)
    at
org.apache.cxf.binding.soap.interceptor.CheckFaultInterceptor.handleMessage(CheckFaultInterceptor.java:69)
    at
org.apache.cxf.binding.soap.interceptor.CheckFaultInterceptor.handleMessage(CheckFaultInterceptor.java:34)
    at
org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:262)
    at org.apache.cxf.endpoint.ClientImpl.onMessage(ClientImpl.java:798)
    at
org.apache.cxf.transport.http.HTTPConduit$WrappedOutputStream.handleResponseInternal(HTTPConduit.java:1656)
    at
org.apache.cxf.transport.http.HTTPConduit$WrappedOutputStream.handleResponse(HTTPConduit.java:1521)
    at
org.apache.cxf.transport.http.HTTPConduit$WrappedOutputStream.close(HTTPConduit.java:1429)
    at
org.apache.cxf.transport.AbstractConduit.close(AbstractConduit.java:56)
    at org.apache.cxf.transport.http.HTTPConduit.close(HTTPConduit.java:659)
    at
org.apache.cxf.interceptor.MessageSenderInterceptor$MessageSenderEndingInterceptor.handleMessage(MessageSenderInterceptor.java:62)
    at
org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:262)
    at org.apache.cxf.endpoint.ClientImpl.doInvoke(ClientImpl.java:532)
    at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:464)
    at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:367)
    at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:320)
    at org.apache.cxf.frontend.ClientProxy.invokeSync(ClientProxy.java:89)
    at
org.apache.cxf.jaxws.JaxWsClientProxy.invoke(JaxWsClientProxy.java:134)
    ... 34 more

Results :

Tests in error:
 
testKerberosOverSymmetric(org.apache.cxf.systest.ws.kerberos.KerberosTokenTest):
General security error (An error occurred in trying to validate a ticket)

Tests run: 12, Failures: 0, Errors: 1, Skipped: 11
       
Output using version "1.7.0_3":

-------------------------------------------------------
 T E S T S
-------------------------------------------------------
Running org.apache.cxf.systest.ws.kerberos.KerberosTokenTest
In testKerberosOverSymmetric.
Unrestricted policies installed
Debug is  true storeKey false useTicketCache false useKeyTab true
doNotPrompt false ticketCache is null isInitiator true KeyTab is
/etc/_kerbisspoc.keytab refreshKrb5Config is true principal is
HTTP/_kerbisspoc-service.melkweg.tld@ tryFirstPass is false useFirstPass is
false storePass is false clearPass is false
Refreshing Kerberos configuration
Config name: /etc/krb5.conf
>>> KdcAccessibility: reset
>>> KdcAccessibility: reset
>>> KeyTabInputStream, readName(): MELKWEG.TLD
>>> KeyTabInputStream, readName(): HTTP
>>> KeyTabInputStream, readName(): _kerbisspoc-service.melkweg.tld
>>> KeyTab: load() entry length: 83; type: 23
Added key: 23version: 4
Ordering keys wrt default_tkt_enctypes list
Using builtin default etypes for default_tkt_enctypes
default etypes for default_tkt_enctypes: 18 17 16 23 1 3.
Added key: 23version: 4
Ordering keys wrt default_tkt_enctypes list
Using builtin default etypes for default_tkt_enctypes
default etypes for default_tkt_enctypes: 18 17 16 23 1 3.
Using builtin default etypes for default_tkt_enctypes
default etypes for default_tkt_enctypes: 18 17 16 23 1 3.
>>> KrbAsReq creating message
>>> KrbKdcReq send: kdc=corx01.melkweg.tld UDP:88, timeout=30000, number of
>>> retries =3, #bytes=166
>>> KDCCommunication: kdc=corx01.melkweg.tld UDP:88, timeout=30000,Attempt
>>> =1, #bytes=166
>>> KrbKdcReq send: #bytes read=631
>>> KdcAccessibility: remove corx01.melkweg.tld
Added key: 23version: 4
Ordering keys wrt default_tkt_enctypes list
Using builtin default etypes for default_tkt_enctypes
default etypes for default_tkt_enctypes: 18 17 16 23 1 3.
>>> EType: sun.security.krb5.internal.crypto.ArcFourHmacEType
>>> KrbAsRep cons in KrbAsReq.getReply HTTP/_kerbisspoc-service.melkweg.tld
principal is HTTP/[email protected]
Will use keytab
Commit Succeeded

Found ticket for HTTP/[email protected] to go to
krbtgt/[email protected] expiring on Thu Apr 26 03:33:58 CEST 2012
Entered Krb5Context.initSecContext with state=STATE_NEW
Found ticket for HTTP/[email protected] to go to
krbtgt/[email protected] expiring on Thu Apr 26 03:33:58 CEST 2012
Service ticket not found in the subject
>>> Credentials acquireServiceCreds: same realm
Using builtin default etypes for default_tgs_enctypes
default etypes for default_tgs_enctypes: 18 17 16 23 1 3.
>>> CksumType: sun.security.krb5.internal.crypto.RsaMd5CksumType
>>> EType: sun.security.krb5.internal.crypto.ArcFourHmacEType
>>> KrbKdcReq send: kdc=corx01.melkweg.tld UDP:88, timeout=30000, number of
>>> retries =3, #bytes=665
>>> KDCCommunication: kdc=corx01.melkweg.tld UDP:88, timeout=30000,Attempt
>>> =1, #bytes=665
>>> KrbKdcReq send: #bytes read=643
>>> KdcAccessibility: remove corx01.melkweg.tld
>>> EType: sun.security.krb5.internal.crypto.ArcFourHmacEType
>>> KrbApReq: APOptions are 00000000 00000000 00000000 00000000
>>> EType: sun.security.krb5.internal.crypto.ArcFourHmacEType
Krb5Context setting mySeqNumber to: 87301791
Krb5Context setting peerSeqNumber to: 0
Created InitSecContextToken:

0000: 01 00 6E 82 02 2B 30 82   02 27 A0 03 02 01 05 A1  ..n..+0..'......
0010: 03 02 01 0E A2 07 03 05   00 00 00 00 00 A3 82 01  ................
0020: 33 61 82 01 2F 30 82 01   2B A0 03 02 01 05 A1 0D  3a../0..+.......
0030: 1B 0B 4D 45 4C 4B 57 45   47 2E 54 4C 44 A2 32 30  ..MELKWEG.TLD.20
0040: 30 A0 03 02 01 00 A1 29   30 27 1B 04 48 54 54 50  0......)0'..HTTP
0050: 1B 1F 5F 6B 65 72 62 69   73 73 70 6F 63 2D 73 65  .._kerbisspoc-se
0060: 72 76 69 63 65 2E 6D 65   6C 6B 77 65 67 2E 74 6C  rvice.melkweg.tl
0070: 64 A3 81 E0 30 81 DD A0   03 02 01 17 A1 03 02 01  d...0...........
0080: 04 A2 81 D0 04 81 CD BB   FE 9C 11 EC DB 48 8D 5E  .............H.^
0090: D5 C7 B8 C8 A9 6F 42 E3   09 F1 C5 33 C7 A6 5C B5  .....oB....3..\.
00A0: EE B8 E5 6C 8E EC 5C BB   15 07 17 1E 10 BC D2 78  ...l..\........x
00B0: 5E 06 6F FC 7E D7 54 9A   7C DD CC 55 90 98 F1 BF  ^.o...T....U....
00C0: 45 BD 98 31 44 0F 6E F9   E6 99 8E FD 2C C8 DA E5  E..1D.n.....,...
00D0: 92 2D A0 3D 9A 87 EC BD   44 CC 7C 72 ED B7 21 58  .-.=....D..r..!X
00E0: 66 2D A4 36 A0 F9 4E 0E   D4 7B 69 4B 2E 12 5B A4  f-.6..N...iK..[.
00F0: 77 B0 10 8E B4 6F 4A 9E   D1 89 BC 7C 53 E5 17 60  w....oJ.....S..`
0100: 0B FB 7F 25 7C 56 E3 39   83 1C 97 38 85 ED C8 6A  ...%.V.9...8...j
0110: C4 88 13 1D 48 4F 48 07   76 60 4D B7 CD 43 B1 A0  ....HOH.v`M..C..
0120: B8 BB 8D F5 C6 14 CF 8D   41 30 4E BC A4 C3 99 D1  ........A0N.....
0130: E7 FE F6 42 9D 44 1F 39   E7 37 B6 04 BD FF ED 37  ...B.D.9.7.....7
0140: CD C1 6A 79 B4 6C 2B 65   09 22 E1 2C 5B A8 21 76  ..jy.l+e.".,[.!v
0150: D5 91 AB 7D A4 81 DA 30   81 D7 A0 03 02 01 17 A2  .......0........
0160: 81 CF 04 81 CC B7 75 8C   38 22 08 CE BE C4 B8 9C  ......u.8"......
0170: 85 19 DC F9 8F 64 33 A2   9D 9A 8C C6 7A 72 DA 2E  .....d3.....zr..
0180: 77 BC 6C D6 09 08 E9 4A   D6 CC C5 6B 95 89 3D 63  w.l....J...k..=c
0190: E0 B9 B1 A0 8F 70 B8 41   01 80 F4 C9 34 16 36 D1  .....p.A....4.6.
01A0: 34 55 91 14 4D DE BF 7A   54 D3 7C 39 A2 02 59 A8  4U..M..zT..9..Y.
01B0: 1B 40 70 FC D3 86 E7 62   92 4B 42 75 4F 92 8A 1C  [email protected]...
01C0: B4 2F 09 77 F4 27 86 72   37 54 29 99 59 88 3E 42  ./.w.'.r7T).Y.>B
01D0: 00 EB 73 74 44 AA 9B 28   F7 7E 58 00 8F D9 06 ED  ..stD..(..X.....
01E0: 59 52 3C EF B9 A9 45 B4   97 BC CC D4 1F 4F D7 45  YR<...E......O.E
01F0: 66 58 A3 31 34 A4 63 C0   E9 19 5D 80 71 37 34 33  fX.14.c...].q743
0200: 5E 2D 45 77 53 BF 6A 1F   21 41 0A 4B C6 DF 60 54  ^-EwS.j.!A.K..`T
0210: D4 EE C4 A1 55 48 6B AF   0C BD 52 46 8B C4 C9 FB  ....UHk...RF....
0220: 75 76 5F 99 D6 26 26 DC   5B 10 E9 18 88 E2 9B 57  uv_..&&.[......W
0230: 07                                                 .

Debug is  true storeKey true useTicketCache false useKeyTab true doNotPrompt
false ticketCache is null isInitiator true KeyTab is /etc/_kerbisspoc.keytab
refreshKrb5Config is true principal is
HTTP/[email protected] tryFirstPass is false
useFirstPass is false storePass is false clearPass is false
Refreshing Kerberos configuration
Config name: /etc/krb5.conf
>>> KdcAccessibility: reset
Added key: 23version: 4
Ordering keys wrt default_tkt_enctypes list
Using builtin default etypes for default_tkt_enctypes
default etypes for default_tkt_enctypes: 18 17 16 23 1 3.
Added key: 23version: 4
Ordering keys wrt default_tkt_enctypes list
Using builtin default etypes for default_tkt_enctypes
default etypes for default_tkt_enctypes: 18 17 16 23 1 3.
Using builtin default etypes for default_tkt_enctypes
default etypes for default_tkt_enctypes: 18 17 16 23 1 3.
>>> KrbAsReq creating message
>>> KrbKdcReq send: kdc=corx01.melkweg.tld UDP:88, timeout=30000, number of
>>> retries =3, #bytes=166
>>> KDCCommunication: kdc=corx01.melkweg.tld UDP:88, timeout=30000,Attempt
>>> =1, #bytes=166
>>> KrbKdcReq send: #bytes read=631
>>> KdcAccessibility: remove corx01.melkweg.tld
Added key: 23version: 4
Ordering keys wrt default_tkt_enctypes list
Using builtin default etypes for default_tkt_enctypes
default etypes for default_tkt_enctypes: 18 17 16 23 1 3.
>>> EType: sun.security.krb5.internal.crypto.ArcFourHmacEType
>>> KrbAsRep cons in KrbAsReq.getReply HTTP/_kerbisspoc-service.melkweg.tld
principal is HTTP/[email protected]
Will use keytab
Added key: 23version: 4
Ordering keys wrt default_tkt_enctypes list
Using builtin default etypes for default_tkt_enctypes
default etypes for default_tkt_enctypes: 18 17 16 23 1 3.
Commit Succeeded

Found KeyTab
Found KerberosKey for HTTP/[email protected]
Entered Krb5Context.acceptSecContext with state=STATE_NEW
Added key: 23version: 4
Ordering keys wrt default_tkt_enctypes list
Using builtin default etypes for default_tkt_enctypes
default etypes for default_tkt_enctypes: 18 17 16 23 1 3.
>>> EType: sun.security.krb5.internal.crypto.ArcFourHmacEType
Using builtin default etypes for permitted_enctypes
default etypes for permitted_enctypes: 18 17 16 23 1 3.
>>> EType: sun.security.krb5.internal.crypto.ArcFourHmacEType
replay cache for HTTP/[email protected] is null.
object 0: 1335368038927/927468
object 0: 1335368038927/927468
>>> KrbApReq: authenticate succeed.
Krb5Context setting peerSeqNumber to: 87301791
Krb5Context setting mySeqNumber to: 87301791
Tests run: 12, Failures: 0, Errors: 0, Skipped: 11, Time elapsed: 7.707 sec

Results :

Tests run: 12, Failures: 0, Errors: 0, Skipped: 11

So, does anybody know if this is my own fault, or if it is caused by a bug
in java?

--
View this message in context: 
http://cxf.547215.n5.nabble.com/Kerberos-and-credential-propagation-tp5646577p5665237.html
Sent from the cxf-user mailing list archive at Nabble.com.

Reply via email to