Greetings all: Thought to check the kerberos logs, and found the following two unique entry groupings for my correct password attempts: krb5kdc[](info): AS_REQ (8 etypes {18 17 16 5 23 3 2 1}) sandbox3_ipv4: NEEDED_PREAUTH: [email protected] for coda/[email protected], Additional pre-authentication required krb5kdc[](info): AS_REQ (8 etypes {18 17 16 5 23 3 2 1}) sandbox3_ipv4: ISSUE: authtime epoch_time, etypes {rep=18 tkt=18 ses=18}, [email protected] for coda/[email protected] krb5kdc[](info): AS_REQ (8 etypes {18 17 16 5 23 3 2 1}) sandbox3_ipv4: NEEDED_PREAUTH: [email protected] for coda/[email protected], Additional pre-authentication required krb5kdc[](info): AS_REQ (8 etypes {18 17 16 5 23 3 2 1}) sandbox3_ipv4: ISSUE: authtime epoch_time, etypes {rep=18 tkt=18 ses=18}, [email protected] for coda/[email protected] NOTE1: It appears that clog appends KERBEROS.REALM to the principal if it is not explicitly stipulated in the -servprinc option.
NOTE2:  Log was meddled with in the following ways:
 stripped out leading syslog style datestamp and hostname
 stripped out krb5kdc pid inbetween []
 obfuscated sandbox3_ipv4, kerberos_admin_user, host.domain, epoch_time,
and KERBEROS.REALM

The following logs show an incorrect password attempt (even though vice/auth2/AuthLog has no corresponding entry): krb5kdc[](info): AS_REQ (8 etypes {18 17 16 5 23 3 2 1}) sandbox3_ipv4: NEEDED_PREAUTH: [email protected] for coda/[email protected], Additional pre-authentication required krb5kdc[](info): preauth (timestamp) verify failure: Decrypt integrity check failed krb5kdc[](info): AS_REQ (8 etypes {18 17 16 5 23 3 2 1}) sandbox3_ipv4: PREAUTH_FAILED: [email protected] for coda/[email protected], Decrypt integrity check failed NOTE1: I don't know that this is particularly useful in my case beyond abstract trivia
NOTE2:  Log was meddled with in the following ways:
 stripped out leading syslog style datestamp and hostname
 stripped out krb5kdc pid inbetween []
 obfuscated sandbox3_ipv4, kerberos_admin_user, host.domain,
    and KERBEROS.REALM
did NOT touch "preauth (timestamp)" -- likely generic due to failure

Regards,
-Don
{void}

root writes:
Greetings all: Here are some clog attempts with -servprinc defined -- whacked out for readability:
[r...@sandbox3 ~]# clog \
 -method kerberos5 [email protected] \
 -tokenserver sandbox2.host.domain 370 \
 -krealm KERBEROS.REALM \
 -kdc sandbox2.host.domain \
-servprinc coda/sandbox3.host.domain
[r...@sandbox3 ~]# clog \
 -method kerberos5 [email protected] \
 -tokenserver sandbox2.host.domain 370 \
 -krealm KERBEROS.REALM \
 -kdc sandbox2.host.domain \
-servprinc coda/[email protected]
[r...@sandbox3 ~]# clog \
 -method kerberos5 [email protected] \
 -tokenserver sandbox2.host.domain 370 \
 -krealm KERBEROS.REALM \
 -kdc sandbox2.host.domain \
-servprinc coda/sandbox2.host.domain
[r...@sandbox3 ~]# clog \
 -method kerberos5 [email protected] \
 -tokenserver sandbox2.host.domain 370 \
 -krealm KERBEROS.REALM \
 -kdc sandbox2.host.domain \
-servprinc coda/[email protected] I attempted the password three times for each clog command above -- twice with password correct, and once with password incorrect. When password was correct, I got the following:
Password for coda_admin_user/[email protected]:
Invalid login (RPC2_NOTAUTHENTICATED (F)).

When password was incorrect, I got the following:
krb5secret: Password incorrect
clog: failed to login to Kerberos

On the server host, the vice/auth2/AuthLog had the following entries corresponding to my tests:
Authentication failed for "TOKEN?" from [sandbox3_ipv6]:random_port
Authentication failed for "TOKEN?" from [sandbox3_ipv6]:random_port
Authentication failed for "TOKEN?" from [sandbox3_ipv6]:random_port
Authentication failed for "TOKEN?" from [sandbox3_ipv6]:random_port
Authentication failed for "TOKEN?" from [sandbox3_ipv6]:random_port
Authentication failed for "TOKEN?" from [sandbox3_ipv6]:random_port
Authentication failed for "TOKEN?" from [sandbox3_ipv6]:random_port NOTE1: These log entries correspond to the "RPC2_NOTAUTHENTICATED" errors above. There are NO LOG ENTRIES corresponding to the "krb5secret: Password incorrect" errors.
NOTE2:  Meddled with logs in the following ways:
 Stripped out leading date & time stamps
 The following substitution was made:
    n???0?????????????????? ???????a???0????????????KERBEROS.REALM?)
    TOKEN?
Obfuscated text at "KERBEROS.REALM", "sandbox3_ipv6" and "random_port"

So, we know that clog is connecting to the auth2 daemon. I don't really know how the auth2 daemon is connecting to kerberos, but I suspect that may be the segment which is failing. I simply don't know if it is failing because of:
*) clog command-line
*) vice/server.conf misconfig
*) coda user incorrect (/vice/bin/pdbtool)
*) kerberos principal(s) incorrect (and subsequently, the keytab) Undoubtedly it is a little of several of the above.
Regards,
-Don
{void}



Reply via email to