Garrison, Eric C wrote:
Quoting Jeffrey Altman <jalt...@secure-endpoints.com>:

Eric Chris Garrison wrote:

...but as ecgar...@ads.iu.edu:

Wed Jul 1 15:58:37 2009 [6] EVENT AFS_Aud_Unauth CODE -1 STR AFS_SRX_StData
Wed Jul  1 15:58:37 2009 [6] EVENT AFS_SRX_StData CODE 0 NAME --UnAuth--
HOST 149.166.144.33 ID 32766 FID 536870933:2:2

So the ADS.IU.EDU user is showing as unauthorized?  Strange that if I
create a file, its UNIX permissions show as owned by ecgarris though.

I would also verify that the keytabs that you are using are in fact
correct.  You can do so using the MIT Kerberos kvno command.  Obtain a
TGT for ecgar...@ads.iu.edu and then issue:

  kvno -k <keytab> afs/afstest.iu....@ads.iu.edu

Your Rx connection is unauthenticated.  That means that

(a) either you do not have an AFS token

(b) the token contains a kvno that is not recognized by the AFS server

(c) the token is bad in some other way

Could be the keys don't match.
Looks like AD is giving you a ticket with AES! Must be W2008 server,
and you did not specify des-only with ktpass for the AFS key.

How did you create the AD entry and key? Using ktpass?
Is it DES only?

How did you add the key to the AFS key file in the servers?

If you have problems, with ktpass, there is a version of msktutil
that will work with Windows 2008.

    http://download.systemimager.org/~finley/msktutil/
(Finley is here at ANL.)



On Windows using the MIT KFW klist command, what does "klist -e" show
when you have an afs/afstest.iu....@ads.iu.edu service ticket in the cache?


I have done an "aklog -c afstest.iu.edu" giving the following output for "tokens":
Tokens held by the Cache Manager:

User's (AFS ID 37302) tokens for a...@afstest.iu.edu [Expires Jul  9 00:53]
 --End of list--

The kvno command comes back with the right kvno, as seen by ktutil for the keytab, just
as it was when I added it with astekey.

Here's what "klist -e" says:

Default principal: ecgar...@ads.iu.edu

Valid starting     Expires            Service principal
07/08/09 14:53:40  07/09/09 00:53:44  krbtgt/ads.iu....@ads.iu.edu
renew until 07/09/09 14:53:40, Etype (skey, tkt): AES-256 CTS mode with 96-bit
SHA-1 HMAC, AES-256 CTS mode with 96-bit SHA-1 HMAC
07/08/09 14:53:56  07/09/09 00:53:44  afs/afstest.iu....@ads.iu.edu
renew until 07/09/09 14:53:40, Etype (skey, tkt): AES-256 CTS mode with 96-bit
SHA-1 HMAC, AES-256 CTS mode with 96-bit SHA-1 HMAC

The AFS tickets and keys must be DES today. Your server must be W2008.


So what else should I look for in the token being bad in another way?

Thanks again,

Chris


_______________________________________________
OpenAFS-info mailing list
OpenAFS-info@openafs.org
https://lists.openafs.org/mailman/listinfo/openafs-info



--

 Douglas E. Engert  <deeng...@anl.gov>
 Argonne National Laboratory
 9700 South Cass Avenue
 Argonne, Illinois  60439
 (630) 252-5444
_______________________________________________
OpenAFS-info mailing list
OpenAFS-info@openafs.org
https://lists.openafs.org/mailman/listinfo/openafs-info

Reply via email to