Hi Colm,
The SpnegoContextTokenOutInterceptor is never reaching the point where tok is 
non-null, b/c it’s trying to get tokenID from the message first and is failing 
there.  I did set a breakpoint at the line where it’s trying to get the token 
ID from the message (line 59 in 2.7.14), though, and was able to create a new 
SecurityToken with a dummy ID, and then execute your test code against that 
with no problem.  After running it, I pulled the token ID and token from both 
the Exchange and the TokenStore without issue.

On the security policy, I’m not sure how to tell … can you point me in the 
right direction?

Thanks for the help!

Mark


> On Jan 26, 2015, at 6:41 AM, Colm O hEigeartaigh <[email protected]> wrote:
> 
> Can you see in the SpnegoContextTokenOutInterceptor via a debugger whether
> it is actually storing the message ID successfully?
> 
> message.getExchange().put(SecurityConstants.TOKEN_ID, tok.getId());
> NegotiationUtils.getTokenStore(message).add(tok);
> 
> If it is then it might be a problem with the security policy. I've seen
> something similar with WS-MEX before. Can you post the exact security
> policy here?
> 
> Colm.
> 
> On Fri, Jan 23, 2015 at 6:31 PM, Mark Durant <[email protected]> wrote:
> 
>> Hi all,
>> I’ve been trying to create and test a CXF client that’s consuming a web
>> service secured with SPNEGO/Kerberos authentication on a Windows 2008
>> server.  I’m neither a Windows nor a security guru by any stretch of the
>> imagination, but mainly following Groovy Tom’s advice at
>> http://groovyjava-tom.blogspot.com/2012/01/cxf-and-ms-crm-2011.html, I
>> believe I’ve gotten very close to making this work.  I’ve hit a snag near
>> the end, though, that I’m hoping someone here can provide me some insight
>> into.
>> 
>> I’ve created the web service client from the WSDL using CXF without issue,
>> and my test code is essentially wrapping the basics there with what I found
>> in the blog post.  Here’s the code:
>> 
>> System.setProperty("java.security.auth.login.config",
>> "/home/developer/apache-cxf-2.7.14/login.conf");
>> System.setProperty("java.security.krb5.conf",
>> "/home/developer/apache-cxf-2.7.14/krb5.conf");
>> System.setProperty("sun.security.krb5.debug", "true");
>> 
>> AgentInventoryService service = new AgentInventoryService();
>> IAgentInventoryService port =
>> service.getWSHttpBindingIAgentInventoryService();
>> 
>> Client client = ClientProxy.getClient(port);
>> 
>> client.getRequestContext().put("ws-security.kerberos.jaas.context",
>> "spnego-client");
>> client.getRequestContext().put("ws-security.kerberos.spn",
>> "RestrictedKrbHost/nxesideploy4");
>> client.getRequestContext().put("ws-security.spnego.client.action", new
>> XRMSpnegoClientAction());
>> 
>> Bus bus = ((EndpointImpl) client.getEndpoint()).getBus();
>> PolicyInterceptorProviderRegistry pipr =
>> bus.getExtension(PolicyInterceptorProviderRegistry.class);
>> pipr.register(new XRMAuthPolicyProvider());
>> 
>> CallbackHandler callbackHandler = new NamePasswordCallbackHandler(kuser,
>> kpass);
>> client.getRequestContext().put("ws-security.callback-handler",
>> callbackHandler);
>> 
>> STSClient sts = new STSClient(bus);
>> sts.setFeatures(Arrays.asList(new Feature() {
>> @Override
>> public void initialize(Server server, Bus bus) {
>> }
>> 
>> @Override
>> public void initialize(Client client, Bus bus) {
>> bus.getProperties().put("soap.no.validate.parts", true);
>> }
>> 
>> @Override
>> public void initialize(InterceptorProvider interceptorProvider, Bus bus) {
>> }
>> 
>> @Override
>> public void initialize(Bus bus) {
>> }
>> }));
>> client.getRequestContext().put("ws-security.sts.client", sts);
>> 
>> AgentUser agentUser = new AgentUser();
>> agentUser.setAgentId("007-DEF");
>> agentUser.setFirstName("Mark");
>> agentUser.setLastName("Durant");
>> 
>> Integer result = port.save(agentUser);
>> 
>> System.out.println("result = " + result);
>> 
>> I’ve tested my krb5.conf with kinit, and it’s working fine.  With Kerberos
>> debugging on, I can see that that part of the application is working, too.
>> After getting that token, though, the library seems to gets caught in a
>> loop, continually reaching out to the domain controller for a new token.
>> The looping starts in SpnegoContextTokenOutInterceptor's
>> handleMessage(SoapMessage) call: It tries to get the "ws-security.token.id"
>> from the message, but it's not there; so seeing that it has a null token,
>> it requests a security token from the STSClient, and that request gets
>> caught up in the same interceptor where the ws-security.token.id is null,
>> and it just keeps rolling from there under I get a StackOverflow error.
>> Here’s the stack trace:
>> 
>> Jan 23, 2015 12:46:23 PM org.apache.cxf.phase.PhaseInterceptorChain
>> doDefaultLogging
>> WARNING: Interceptor for {
>> http://schemas.xmlsoap.org/ws/2005/02/trust/wsdl}SecurityTokenService#{http://schemas.xmlsoap.org/ws/2005/02/trust/wsdl}RequestSecurityToken
>> has thrown exception, unwinding now
>> org.apache.cxf.interceptor.Fault: General security error (An error
>> occurred in trying to obtain a TGT: java.lang.StackOverflowError
>> at java.net.PlainDatagramSocketImpl.receive0(Native Method)
>> at
>> java.net.AbstractPlainDatagramSocketImpl.receive(AbstractPlainDatagramSocketImpl.java:145)
>> at java.net.DatagramSocket.receive(DatagramSocket.java:786)
>> at sun.security.krb5.internal.UDPClient.receive(NetClient.java:207)
>> at sun.security.krb5.KdcComm$KdcCommunication.run(KdcComm.java:386)
>> at sun.security.krb5.KdcComm$KdcCommunication.run(KdcComm.java:339)
>> at java.security.AccessController.doPrivileged(Native Method)
>> at sun.security.krb5.KdcComm.send(KdcComm.java:323)
>> at sun.security.krb5.KdcComm.send(KdcComm.java:219)
>> at sun.security.krb5.KdcComm.send(KdcComm.java:191)
>> at sun.security.krb5.KrbAsReqBuilder.send(KrbAsReqBuilder.java:319)
>> at sun.security.krb5.KrbAsReqBuilder.action(KrbAsReqBuilder.java:364)
>> at
>> com.sun.security.auth.module.Krb5LoginModule.attemptAuthentication(Krb5LoginModule.java:721)
>> at
>> com.sun.security.auth.module.Krb5LoginModule.login(Krb5LoginModule.java:580)
>> at sun.reflect.GeneratedMethodAccessor16.invoke(Unknown Source)
>> at
>> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>> at java.lang.reflect.Method.invoke(Method.java:601)
>> at javax.security.auth.login.LoginContext.invoke(LoginContext.java:784)
>> at javax.security.auth.login.LoginContext.access$000(LoginContext.java:203)
>> at javax.security.auth.login.LoginContext$4.run(LoginContext.java:698)
>> at javax.security.auth.login.LoginContext$4.run(LoginContext.java:696)
>> at java.security.AccessController.doPrivileged(Native Method)
>> at javax.security.auth.login.LoginContext.invokePriv(LoginContext.java:695)
>> at javax.security.auth.login.LoginContext.login(LoginContext.java:594)
>> at
>> org.apache.ws.security.spnego.SpnegoTokenContext.retrieveServiceTicket(SpnegoTokenContext.java:121)
>> at
>> org.apache.ws.security.spnego.SpnegoTokenContext.retrieveServiceTicket(SpnegoTokenContext.java:89)
>> at
>> org.apache.ws.security.spnego.SpnegoTokenContext.retrieveServiceTicket(SpnegoTokenContext.java:70)
>> at
>> org.apache.cxf.ws.security.policy.interceptors.SpnegoContextTokenOutInterceptor.issueToken(SpnegoContextTokenOutInterceptor.java:114)
>> at
>> org.apache.cxf.ws.security.policy.interceptors.SpnegoContextTokenOutInterceptor.handleMessage(SpnegoContextTokenOutInterceptor.java:73)
>> at
>> org.apache.cxf.ws.security.policy.interceptors.SpnegoContextTokenOutInterceptor.handleMessage(SpnegoContextTokenOutInterceptor.java:46)
>> at
>> org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:272)
>> at org.apache.cxf.endpoint.ClientImpl.doInvoke(ClientImpl.java:572)
>> at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:481)
>> at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:382)
>> at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:335)
>> at
>> org.apache.cxf.ws.security.trust.AbstractSTSClient.issue(AbstractSTSClient.java:855)
>> at
>> org.apache.cxf.ws.security.trust.STSClient.requestSecurityToken(STSClient.java:62)
>> at
>> org.apache.cxf.ws.security.trust.STSClient.requestSecurityToken(STSClient.java:56)
>> at
>> org.apache.cxf.ws.security.policy.interceptors.SpnegoContextTokenOutInterceptor.issueToken(SpnegoContextTokenOutInterceptor.java:134)
>> at
>> org.apache.cxf.ws.security.policy.interceptors.SpnegoContextTokenOutInterceptor.handleMessage(SpnegoContextTokenOutInterceptor.java:73)
>> at
>> org.apache.cxf.ws.security.policy.interceptors.SpnegoContextTokenOutInterceptor.handleMessage(SpnegoContextTokenOutInterceptor.java:46)
>> at
>> org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:272)
>> at org.apache.cxf.endpoint.ClientImpl.doInvoke(ClientImpl.java:572)
>> at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:481)
>> at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:382)
>> at org.apache.cxf.endpoint.ClientImpl.invoke(ClientImpl.java:335)
>> at
>> org.apache.cxf.ws.security.trust.AbstractSTSClient.issue(AbstractSTSClient.java:855)
>> at
>> org.apache.cxf.ws.security.trust.STSClient.requestSecurityToken(STSClient.java:62)
>> at
>> org.apache.cxf.ws.security.trust.STSClient.requestSecurityToken(STSClient.java:56)
>> at
>> org.apache.cxf.ws.security.policy.interceptors.SpnegoContextTokenOutInterceptor.issueToken(SpnegoContextTokenOutInterceptor.java:134)
>> at
>> org.apache.cxf.ws.security.policy.interceptors.SpnegoContextTokenOutInterceptor.handleMessage(SpnegoContextTokenOutInterceptor.java:73)
>> at
>> org.apache.cxf.ws.security.policy.interceptors.SpnegoContextTokenOutInterceptor.handleMessage(SpnegoContextTokenOutInterceptor.java:46)
>> at
>> org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:272)
>> 
>> That repeats until the application dies.
>> 
>> This is all done with CXF 2.7.14.  I tried it with 3.0.3 originally, and
>> hit the same problem, but backed down to 2.7 since that was where the blog
>> post was successful.
>> 
>> If there’s anything else I can provide that might give a hint about what’s
>> happening, please let me know.
>> 
>> Thanks,
>> Mark
>> 
>> 
> 
> 
> -- 
> Colm O hEigeartaigh
> 
> Talend Community Coder
> http://coders.talend.com

Reply via email to