Sorry,  version pasted wasn't edited properly.  There were some other
errors which I fixed.  I seem to have narrowed the problem down.  kinit
-k  is finding the AD domain controller which created the keytab.  It
is, however, using the wrong principal.   If I do a kinit -k
ADhost.keytab

strace on the RedHat 2.4.9 system shows:

ethereal protocol KRB5  AS-REQ
Kerberos
Version: 5
MSG Type: AS-REQ
Request
Options: 0000000000
Client Name: ADhost.keytab
Type: Principal
Name: ADhost.keytab
Realm: ADDOMAIN.COM
Server Name: krbtgt
Type: Unknown
Name: krbtgt
Name: ADDOMAIN.COM
Start Time: 2005-01-31 21:21:33 (Z)
End Time: 2005-02-01 07:21:33 (Z)
Random Number: 1107206493
Encryption Types
Type: des3-cbc-sha1
Type: des-cbc-md5
Type: des-cbc-crc
Addresses
Type: IPv4
Value: 165.2.18.5

Kerberos
Version: 5
MSG Type: KRB-ERROR
stime: 2005-01-31 21:26:39 (Z)
susec: 349682
Error Code: KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN
realm: ADDOMAIN.COM
sname: krbtgt
Type: Unknown
Name: krbtgt
Name: ADDOMAIN.COM

So it is taking the keytab file name for some reason for the principal
name.  I tried renaming ADhost.keytab ADhost, but now I get a
segmentation fault.

________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to