On 1/9/2012 10:05 AM, Jeff White wrote:
Thanks for the reply. I'm not sure what about short names would cause problems
but I recall hearing about that with AD before so I'll assume it's just a weird
thing/bug with Windows. I originally
created a logon name of 'afs' not 'afs/pitt.edu' so ktpass or something changed
it. I started over with an account named afs-pitt-edu-cell, exported the key,
imported the key, and of course it still
has the DES error as expected. Do you think the KdcUseRequestedEtypesForTickets
registry change which I can't implement without breaking everything as I
mentioned before is why DES is failing? I can
see in gpresult that DES should be allowed and the DES box is checked on the
account so other than that or the attributes Douglas Engert mentioned I don't
know what could be wrong and I'll have to
admit defeat and give up.
C:\Users\jaw171.AFSDC-DEV>ktpass -princ afs/pitt....@pitt.edu -mapuser afs-pitt-
edu-cell -pass * -crypto DES-CBC-MD5 +rndpass /mapop add +desonly /ptype KRB5_NT
_PRINCIPAL +dumpsalt -out afs-pitt-edu-cell.keytab
http://technet.microsoft.com/en-us/library/cc753771(WS.10).aspx
You are specifying both -pass * and +ranpass This looks like it should be
a syntax error and ktpass may be doing something strange.
Did you then enter a password?
If you were to enter a password you could verify that AD has it
correct and that the keytab is correct,
kinit afs/pitt....@pitt.edu
enter password,
should get a ticket verifying that AD has the password.
On unix create a dummy keytab to compare the keytab created by ktpass:
ktutil
addent -password -p afs/pitt....@pitt.edu -kvno 1 -e DES-CBC-MD5
wkt /tmp/dummy.keytab
quit
klist -e -k -t -K /tmp/dummy.keytab
klist -e -k -t -K ktapss.version.keytab
Targeting domain controller: AFSDC-DEV.pitt.edu
Using legacy password setting method
Successfully mapped afs/pitt.edu to afs-pitt-edu-cell.
Building salt with principalname afs/pitt.edu and domain PITT.EDU (encryption ty
pe 3)...
Hashing password with salt "PITT.EDUafspitt.edu".
Key created.
Output keytab to afs-pitt-edu-cell.keytab:
Keytab version: 0x502
keysize 48 afs/pitt....@pitt.edu ptype 1 (KRB5_NT_PRINCIPAL) vno 5 etype 0x3 (DE
S-CBC-MD5) keylength 8 (0x57100bd91a01155d)
Account afs-pitt-edu-cell has been set for DES-only encryption.
Jeff White - Linux/Unix Systems Engineer
University of Pittsburgh - CSSD
On 01/08/2012 11:50 AM, Jeffrey Altman wrote:
Separate from your DES issues, there are two serious problems here.
1. You are creating an account with a logon name of "afs/pitt.edu"
instead of something like "afs-pitt-edu-cell" and then setting a Service
Principal Name of "afs/pitt....@pitt.edu" on that account.
The slash in Kerberos is a name component separator. When aklog
requests a ticket for "afs/pitt....@pitt.edu" it is asking the PITT.EDU
KDC for the principal
"afs" "pitt.edu"
Not the principal
"afs/pitt.edu"
2. You cannot give the account the name "AFS" or have a short name of
"AFS". Doing so will cause name resolution of "a...@pitt.edu" to succeed
which will in turn break all of your deployed Windows AFS clients.
_______________________________________________
OpenAFS-info mailing list
OpenAFS-info@openafs.org
https://lists.openafs.org/mailman/listinfo/openafs-info
--
Douglas E. Engert <deeng...@anl.gov>
Argonne National Laboratory
9700 South Cass Avenue
Argonne, Illinois 60439
(630) 252-5444
_______________________________________________
OpenAFS-info mailing list
OpenAFS-info@openafs.org
https://lists.openafs.org/mailman/listinfo/openafs-info