Re: krb524d, aklog and AFS tokens

2003-03-05 Thread Matthew Mauzy
So I may have fixed it, at least partially.  The AFS token discard error 
number, 19270408, when translated with 'translate_et 19270408' gives 
"ticket contained unknown key version number".  Which after some more 
digging gives the following paragraph from the krb524/README file once 
indicates that my Transarc AFS servers don't understand the encrypted 
tickets:

Configuring krb524d AFS Conversion
==
The krb524d looks in the appdefaults  section of krb5.conf for an
application called afs_krb5 to determine whether  afs principals
support encrypted ticket parts as tokens.  The following configuration
fragment says that afs/[EMAIL PROTECTED] supports the new
token format but [EMAIL PROTECTED] and
afs/[EMAIL PROTECTED] do not.  Note that the default is to
assume afs servers support the new format.
[appdefaults]
afs_krb5 = {
   ATHENA.MIT.EDU = {
   # This stanza describes principals in the
   #ATHENA.MIT.EDU realm
   afs = false
   afs/athena.mit.edu = false
   afs/sipb.mit.edu = true
   }
}
After adding the appdefaults section to my krb5.conf file and restarting 
the krb5kdc and krb524d services, I am now successfully using aklog.  On 
the windows client it looks like WAKE is able to obtain valid AFS tokens 
using the krb tgt (I'm at home trying to do this via XP's remote desktop so 
it's a little painful).

So yeah, steps forward, but ... This seems to only work on systems for 
which there exists a host/FQDN principal in the krb5 database.  So this 
isn't going to work for systems on a DSL connection or systems under DHCP 
with varying hostnames.  (Testing now gives me an error of "Incorrect net 
address".)

So my question to the group, and sorry if this should go to an afs list 
instead of the krb list - what do people use for AFS access for remote/home 
users once they've migrated their afs to krb5?

--Matthew

--On Wednesday, March 05, 2003 11:06 PM -0500 Matthew Mauzy 
<[EMAIL PROTECTED]> wrote:

Key version numbers match (unless I'm not looking at the correct info).
How do I check the enc types?
--Matthew

% bos listkeys db0
key 0 has cksum ...
key 1 has cksum ...
key 2 has cksum ...
Keys last changed on Mon Mar  3 17:34:49 2003.
kadmin:  getprinc afs
Principal: [EMAIL PROTECTED]
...
Last password change: Mon Mar 03 17:32:38 EST 2003
...
Number of keys: 1
Key: vno 2, DES cbc mode with CRC-32, no salt
Attributes:


--On Thursday, March 06, 2003 12:30 PM +1300 Nathan Ward
<[EMAIL PROTECTED]> wrote:
Check your key version numbers, and your enc types. I had this problem
several times and it was a combination of these 2 problems that caused
it.
Nathan Ward

Matthew Mauzy wrote:

I found the following post by Cesar Garcia posted in Feb 2002.  I'm
running into a similar problem and wonder if anyone has solved it.
I just migrated my AFS cell with afs-krb5 Migration Kit v1.3 to use
krb5 v1.2.7.  I'm running fakeka and krb524d on the KDC and
ka-forwarder on the AFS DB servers and am able to use klog and
authenticate to the new krb5 database.  The problem is that aklog
isn't working correctly.  When I kinit (successfully) and then run
aklog I get what appears to be a valid AFS token:
[EMAIL PROTECTED] ~ 8: tokens

Tokens held by the Cache Manager:

User's (AFS ID 9458) tokens for [EMAIL PROTECTED] [Expires Mar  6 03:52]
  --End of list--
but any thing that requires permissions, like 'touch temp', fails with
the following error in the messages file:
kernel: afs: Tokens for user AFS id x for cell amath.unc.edu are
discarded (rxkad error=19270408)
I'm fairly certain that the fakeka/ka-forwarder combo are working
properly as klog still works fine.  It's just tokens that are created
with aklog that fail.
Since the windows AFS clients don't use the ka services, none of my
windows clients are able to login to the AFS cell.  I'm trying to use
WAKE, (from Rose-Hulman http://www.rose-hulman.edu/TSC/software/wake/
) to get around the Windows AFS/krb5 issues, but all the problems keep
coming back to what seems to be a krb524 problem.
--Matthew



__
   Matthew W. Mauzy
 Systems Administrator
 Applied Math @ UNC-CH
email : [EMAIL PROTECTED]   pager : [EMAIL PROTECTED]
(W) 919.962.9819   www.amath.unc.edu/~mauzy/   (P) 919.347.0390
__

Kerberos mailing list   [EMAIL PROTECTED]
https://mailman.mit.edu/mailman/listinfo/kerberos


Re: krb524d, aklog and AFS tokens

2003-03-05 Thread Matthew Mauzy
Key version numbers match (unless I'm not looking at the correct info). 
How do I check the enc types?

--Matthew

% bos listkeys db0
key 0 has cksum ...
key 1 has cksum ...
key 2 has cksum ...
Keys last changed on Mon Mar  3 17:34:49 2003.
kadmin:  getprinc afs
Principal: [EMAIL PROTECTED]
...
Last password change: Mon Mar 03 17:32:38 EST 2003
...
Number of keys: 1
Key: vno 2, DES cbc mode with CRC-32, no salt
Attributes:


--On Thursday, March 06, 2003 12:30 PM +1300 Nathan Ward 
<[EMAIL PROTECTED]> wrote:

Check your key version numbers, and your enc types. I had this problem
several times and it was a combination of these 2 problems that caused it.
Nathan Ward

Matthew Mauzy wrote:

I found the following post by Cesar Garcia posted in Feb 2002.  I'm
running into a similar problem and wonder if anyone has solved it.
I just migrated my AFS cell with afs-krb5 Migration Kit v1.3 to use
krb5 v1.2.7.  I'm running fakeka and krb524d on the KDC and
ka-forwarder on the AFS DB servers and am able to use klog and
authenticate to the new krb5 database.  The problem is that aklog
isn't working correctly.  When I kinit (successfully) and then run
aklog I get what appears to be a valid AFS token:
[EMAIL PROTECTED] ~ 8: tokens

Tokens held by the Cache Manager:

User's (AFS ID 9458) tokens for [EMAIL PROTECTED] [Expires Mar  6 03:52]
  --End of list--
but any thing that requires permissions, like 'touch temp', fails with
the following error in the messages file:
kernel: afs: Tokens for user AFS id x for cell amath.unc.edu are
discarded (rxkad error=19270408)
I'm fairly certain that the fakeka/ka-forwarder combo are working
properly as klog still works fine.  It's just tokens that are created
with aklog that fail.
Since the windows AFS clients don't use the ka services, none of my
windows clients are able to login to the AFS cell.  I'm trying to use
WAKE, (from Rose-Hulman http://www.rose-hulman.edu/TSC/software/wake/
) to get around the Windows AFS/krb5 issues, but all the problems keep
coming back to what seems to be a krb524 problem.
--Matthew

--- Forwarded Message ---

OK. I may have figured the error.
Although the the key version number for my afs principal is 1,
the 1.2.2 krb524d (using -k) returns a V4 cred with a kvno of 0.
I determined this on the client side, I'll have to walk through the
server code to see why the cred is returned with a kvno of 0.
"Cesar" == Cesar Garcia <[EMAIL PROTECTED]> writes:

Cesar> This is not exactly a Kerberos specific issue, but perhaps
Cesar> the folks on this mailing list might have some insight.
Cesar> I decided for now to go with Ken's suggestion that I simply
Cesar> remove the IP addresses from my V5 tickets, and do ticket
Cesar> forwarding sans IP addresses.
Cesar> It appears that the one dependency we have on IP addresses
Cesar> is k524. Our client code is modern and works fine. It's an
Cesar> old krb524d which we currently run on a CyberSafe KDC that
Cesar> requires IP addresses in the requesting ticket.
Cesar> So thanks to Doug Engert, we have a -k option that allows
Cesar> one to run the MIT krb524d with a keytab, which handles
Cesar> null IP addresses just fine - and I don't immediately, or
Cesar> perhaps ever, have to solve the problem of writing the glue
Cesar> to get it to work the CyberSafe KDB. Simply extracting all
Cesar> the necessary keys to a keytab file suffices.
Cesar> I then add the following keys to a keytab file:
Cesar> 1 - krbtgt/[EMAIL PROTECTED]
Cesar> 2 - [EMAIL PROTECTED] (*)
Cesar> (*) An aside - this predates me, so I'm not sure what all
Cesar> the reasons were) Since all of our AFS cells use the same
Cesar> server principal, we don't have afs/[EMAIL PROTECTED]
Cesar> for each of our cells, just one principal [EMAIL PROTECTED]
Cesar> (one k5realm) for all cells. Not sure how/if this is
Cesar> relevant, but it is different.
Cesar> The basic algorithm for obtaining tokens for all cells follows:
Cesar> 1 - using V5 TGS, obtain a ticket V5 ticket for [EMAIL PROTECTED]
Cesar> (this ticket get's cached)
Cesar> 2 - using k524 and V5 ticket for [EMAIL PROTECTED], obtain a V4 ticket
Cesar> for [EMAIL PROTECTED]
Cesar> 3 - foreach cell, invoke ktc_SetToken, passing in the V4 cred
Cesar> obtained in step 2.
Cesar> This code is implemented in a lib/app we call ak5log and works
Cesar> with the cybersafe based krb524d, with either the cybersafe
Cesar> based k524 client or the MIT based k524 client.
Cesar> When we try to run either the cybersafe or MIT based client
Cesar> against the MIT krb524d (using -k), the ak5log code completes,
Cesar> but I get the following messages in syslog:
Cesar> 
Cesar> Feb 12 21:05:09 imus afs: [ID 255639 kern.notice] afs: Tokens
for user of AFS id 4843 for cell w.ny.ms.com are discarded (rxkad
error=19270408)
Cesar> 
Cesar> with a similar error going to my console.
Cesar> krb524init itself seems to work fine against the same MIT
Cesar> krb524d with the keytab. That is the I can V4 tgt and run
Cesar> my v4 ap

Re: krb524d, aklog and AFS tokens

2003-03-05 Thread Cesar Garcia
Understood, I've just been delaying for no good reason.

I'll find time one of these weekends to submit various patches.

Thanks.

> "Sam" == Sam Hartman <[EMAIL PROTECTED]> writes:

> "Cesar" == Cesar Garcia <[EMAIL PROTECTED]> writes:
Cesar> I've been meaning to submit a patch for this to
Cesar> [EMAIL PROTECTED]: *** krb524d.c Wed Mar 5 19:24:17 2003
Cesar> --- krb524d.c.new Wed Mar 5 19:33:44 2003 ***


Sam> If you expect a patch like this to get reviewed and applied:

Sam> 1) You do actually need to submit it to krb5-bugs

Sam> 2) Describe what problem it exists

Sam> 3) Describe why you see the problem and others might not.  This is
Sam>particularly important in this instance as krb524d is very clearly
Sam>not broken for most users.


Sam> --Sam


Kerberos mailing list   [EMAIL PROTECTED]
https://mailman.mit.edu/mailman/listinfo/kerberos


Re: krb524d, aklog and AFS tokens

2003-03-05 Thread Sam Hartman
> "Cesar" == Cesar Garcia <[EMAIL PROTECTED]> writes:

Cesar> I've been meaning to submit a patch for this to
Cesar> [EMAIL PROTECTED]: *** krb524d.c Wed Mar 5 19:24:17 2003
Cesar> --- krb524d.c.new Wed Mar 5 19:33:44 2003 ***


If you expect a patch like this to get reviewed and applied:

1) You do actually need to submit it to krb5-bugs

2) Describe what problem it exists

3) Describe why you see the problem and others might not.  This is
   particularly important in this instance as krb524d is very clearly
   not broken for most users.


--Sam


Kerberos mailing list   [EMAIL PROTECTED]
https://mailman.mit.edu/mailman/listinfo/kerberos


Re: krb524d, aklog and AFS tokens

2003-03-05 Thread Cesar Garcia
I've been meaning to submit a patch for this to [EMAIL PROTECTED]:

*** krb524d.c   Wed Mar  5 19:24:17 2003
--- krb524d.c.new   Wed Mar  5 19:33:44 2003
***
*** 410,418 
--- 410,421 
  /* out of memory? */
  ret = errno;
  memset (key, 0, sizeof (*key));
+   krb5_kt_free_entry(context, &entry);
  return ret;
  }
  
+   if(kvnop)
+ *kvnop = entry.vno;
  krb5_kt_free_entry(context, &entry);
  return 0;
   } else if (use_master) {

This patch in it's form was not compiled or tested, I just forged it
from actual working changes, but it looks correct. (it also includes a
one line fix for a memory leak).

> "Matthew" == Matthew Mauzy <[EMAIL PROTECTED]> writes:

Matthew> I found the following post by Cesar Garcia posted in Feb 2002.  I'm running 
Matthew> into a similar problem and wonder if anyone has solved it.

Matthew> I just migrated my AFS cell with afs-krb5 Migration Kit v1.3 to use krb5 
Matthew> v1.2.7.  I'm running fakeka and krb524d on the KDC and ka-forwarder on the 
Matthew> AFS DB servers and am able to use klog and authenticate to the new krb5 
Matthew> database.  The problem is that aklog isn't working correctly.  When I kinit 
Matthew> (successfully) and then run aklog I get what appears to be a valid AFS 
Matthew> token:

Matthew> [EMAIL PROTECTED] ~ 8: tokens

Matthew> Tokens held by the Cache Manager:

Matthew> User's (AFS ID 9458) tokens for [EMAIL PROTECTED] [Expires Mar  6 03:52]
Matthew>--End of list--


Matthew> but any thing that requires permissions, like 'touch temp', fails with the 
Matthew> following error in the messages file:

Matthew> kernel: afs: Tokens for user AFS id x for cell amath.unc.edu are 
Matthew> discarded (rxkad error=19270408)


Matthew> I'm fairly certain that the fakeka/ka-forwarder combo are working properly 
Matthew> as klog still works fine.  It's just tokens that are created with aklog 
Matthew> that fail.

Matthew> Since the windows AFS clients don't use the ka services, none of my windows 
Matthew> clients are able to login to the AFS cell.  I'm trying to use WAKE, (from 
Matthew> Rose-Hulman http://www.rose-hulman.edu/TSC/software/wake/ ) to get around 
Matthew> the Windows AFS/krb5 issues, but all the problems keep coming back to what 
Matthew> seems to be a krb524 problem.

Matthew> --Matthew

Matthew> --- Forwarded Message ---

Matthew> OK. I may have figured the error.
Matthew> Although the the key version number for my afs principal is 1,
Matthew> the 1.2.2 krb524d (using -k) returns a V4 cred with a kvno of 0.
Matthew> I determined this on the client side, I'll have to walk through the
Matthew> server code to see why the cred is returned with a kvno of 0.

> "Cesar" == Cesar Garcia <[EMAIL PROTECTED]> writes:
Cesar> This is not exactly a Kerberos specific issue, but perhaps
Cesar> the folks on this mailing list might have some insight.
Cesar> I decided for now to go with Ken's suggestion that I simply
Cesar> remove the IP addresses from my V5 tickets, and do ticket
Cesar> forwarding sans IP addresses.
Cesar> It appears that the one dependency we have on IP addresses
Cesar> is k524. Our client code is modern and works fine. It's an
Cesar> old krb524d which we currently run on a CyberSafe KDC that
Cesar> requires IP addresses in the requesting ticket.
Cesar> So thanks to Doug Engert, we have a -k option that allows
Cesar> one to run the MIT krb524d with a keytab, which handles
Cesar> null IP addresses just fine - and I don't immediately, or
Cesar> perhaps ever, have to solve the problem of writing the glue
Cesar> to get it to work the CyberSafe KDB. Simply extracting all
Cesar> the necessary keys to a keytab file suffices.
Cesar> I then add the following keys to a keytab file:
Cesar> 1 - krbtgt/[EMAIL PROTECTED]
Cesar> 2 - [EMAIL PROTECTED] (*)
Cesar> (*) An aside - this predates me, so I'm not sure what all
Cesar> the reasons were) Since all of our AFS cells use the same
Cesar> server principal, we don't have afs/[EMAIL PROTECTED]
Cesar> for each of our cells, just one principal [EMAIL PROTECTED]
Cesar> (one k5realm) for all cells. Not sure how/if this is
Cesar> relevant, but it is different.
Cesar> The basic algorithm for obtaining tokens for all cells follows:
Cesar> 1 - using V5 TGS, obtain a ticket V5 ticket for [EMAIL PROTECTED]
Cesar> (this ticket get's cached)
Cesar> 2 - using k524 and V5 ticket for [EMAIL PROTECTED], obtain a V4 ticket
Cesar> for [EMAIL PROTECTED]
Cesar> 3 - foreach cell, invoke ktc_SetToken, passing in the V4 cred
Cesar> obtained in step 2.
Cesar> This code is implemented in a lib/app we call ak5log and works
Cesar> with the cybersafe based krb524d, with either the cybersafe
Cesar> based k524 client or the MIT based k524 client.
Cesar> When we try to run either the cybersafe or MIT based client
Cesar> against the MIT krb524d (using -k), the ak5log code completes,
Cesar> bu

Re: krb524d, aklog and AFS tokens

2003-03-05 Thread Nathan Ward
Check your key version numbers, and your enc types. I had this problem 
several times and it was a combination of these 2 problems that caused it.

Nathan Ward

Matthew Mauzy wrote:

I found the following post by Cesar Garcia posted in Feb 2002.  I'm 
running into a similar problem and wonder if anyone has solved it.

I just migrated my AFS cell with afs-krb5 Migration Kit v1.3 to use 
krb5 v1.2.7.  I'm running fakeka and krb524d on the KDC and 
ka-forwarder on the AFS DB servers and am able to use klog and 
authenticate to the new krb5 database.  The problem is that aklog 
isn't working correctly.  When I kinit (successfully) and then run 
aklog I get what appears to be a valid AFS token:

[EMAIL PROTECTED] ~ 8: tokens

Tokens held by the Cache Manager:

User's (AFS ID 9458) tokens for [EMAIL PROTECTED] [Expires Mar  6 03:52]
  --End of list--
but any thing that requires permissions, like 'touch temp', fails with 
the following error in the messages file:

kernel: afs: Tokens for user AFS id x for cell amath.unc.edu are 
discarded (rxkad error=19270408)

I'm fairly certain that the fakeka/ka-forwarder combo are working 
properly as klog still works fine.  It's just tokens that are created 
with aklog that fail.

Since the windows AFS clients don't use the ka services, none of my 
windows clients are able to login to the AFS cell.  I'm trying to use 
WAKE, (from Rose-Hulman http://www.rose-hulman.edu/TSC/software/wake/ 
) to get around the Windows AFS/krb5 issues, but all the problems keep 
coming back to what seems to be a krb524 problem.

--Matthew

--- Forwarded Message ---

OK. I may have figured the error.
Although the the key version number for my afs principal is 1,
the 1.2.2 krb524d (using -k) returns a V4 cred with a kvno of 0.
I determined this on the client side, I'll have to walk through the
server code to see why the cred is returned with a kvno of 0.
"Cesar" == Cesar Garcia <[EMAIL PROTECTED]> writes:

Cesar> This is not exactly a Kerberos specific issue, but perhaps
Cesar> the folks on this mailing list might have some insight.
Cesar> I decided for now to go with Ken's suggestion that I simply
Cesar> remove the IP addresses from my V5 tickets, and do ticket
Cesar> forwarding sans IP addresses.
Cesar> It appears that the one dependency we have on IP addresses
Cesar> is k524. Our client code is modern and works fine. It's an
Cesar> old krb524d which we currently run on a CyberSafe KDC that
Cesar> requires IP addresses in the requesting ticket.
Cesar> So thanks to Doug Engert, we have a -k option that allows
Cesar> one to run the MIT krb524d with a keytab, which handles
Cesar> null IP addresses just fine - and I don't immediately, or
Cesar> perhaps ever, have to solve the problem of writing the glue
Cesar> to get it to work the CyberSafe KDB. Simply extracting all
Cesar> the necessary keys to a keytab file suffices.
Cesar> I then add the following keys to a keytab file:
Cesar> 1 - krbtgt/[EMAIL PROTECTED]
Cesar> 2 - [EMAIL PROTECTED] (*)
Cesar> (*) An aside - this predates me, so I'm not sure what all
Cesar> the reasons were) Since all of our AFS cells use the same
Cesar> server principal, we don't have afs/[EMAIL PROTECTED]
Cesar> for each of our cells, just one principal [EMAIL PROTECTED]
Cesar> (one k5realm) for all cells. Not sure how/if this is
Cesar> relevant, but it is different.
Cesar> The basic algorithm for obtaining tokens for all cells follows:
Cesar> 1 - using V5 TGS, obtain a ticket V5 ticket for [EMAIL PROTECTED]
Cesar> (this ticket get's cached)
Cesar> 2 - using k524 and V5 ticket for [EMAIL PROTECTED], obtain a V4 ticket
Cesar> for [EMAIL PROTECTED]
Cesar> 3 - foreach cell, invoke ktc_SetToken, passing in the V4 cred
Cesar> obtained in step 2.
Cesar> This code is implemented in a lib/app we call ak5log and works
Cesar> with the cybersafe based krb524d, with either the cybersafe
Cesar> based k524 client or the MIT based k524 client.
Cesar> When we try to run either the cybersafe or MIT based client
Cesar> against the MIT krb524d (using -k), the ak5log code completes,
Cesar> but I get the following messages in syslog:
Cesar> 
Cesar> Feb 12 21:05:09 imus afs: [ID 255639 kern.notice] afs: Tokens 
for user of AFS id 4843 for cell w.ny.ms.com are discarded (rxkad 
error=19270408)
Cesar> 
Cesar> with a similar error going to my console.
Cesar> krb524init itself seems to work fine against the same MIT
Cesar> krb524d with the keytab. That is the I can V4 tgt and run
Cesar> my v4 apps with no problem.
Cesar> The error apparently corresponds to "Unknown key". I've verified
Cesar> the key and kvno for [EMAIL PROTECTED] that was extracted to the
Cesar> keytab file, and it appears to be correct. I assume I would
Cesar> have failed earlier had that not been the case.
Cesar> When I list my tokens, the listing looks normal.t The
Cesar> tokens themselves, however, are worthless.
Cesar> We're running various versions of transarc afs (3.5, 3.6)
Cesar> on our solaris machine

krb524d, aklog and AFS tokens

2003-03-05 Thread Matthew Mauzy
I found the following post by Cesar Garcia posted in Feb 2002.  I'm running 
into a similar problem and wonder if anyone has solved it.

I just migrated my AFS cell with afs-krb5 Migration Kit v1.3 to use krb5 
v1.2.7.  I'm running fakeka and krb524d on the KDC and ka-forwarder on the 
AFS DB servers and am able to use klog and authenticate to the new krb5 
database.  The problem is that aklog isn't working correctly.  When I kinit 
(successfully) and then run aklog I get what appears to be a valid AFS 
token:

[EMAIL PROTECTED] ~ 8: tokens

Tokens held by the Cache Manager:

User's (AFS ID 9458) tokens for [EMAIL PROTECTED] [Expires Mar  6 03:52]
  --End of list--
but any thing that requires permissions, like 'touch temp', fails with the 
following error in the messages file:

kernel: afs: Tokens for user AFS id x for cell amath.unc.edu are 
discarded (rxkad error=19270408)

I'm fairly certain that the fakeka/ka-forwarder combo are working properly 
as klog still works fine.  It's just tokens that are created with aklog 
that fail.

Since the windows AFS clients don't use the ka services, none of my windows 
clients are able to login to the AFS cell.  I'm trying to use WAKE, (from 
Rose-Hulman http://www.rose-hulman.edu/TSC/software/wake/ ) to get around 
the Windows AFS/krb5 issues, but all the problems keep coming back to what 
seems to be a krb524 problem.

--Matthew

--- Forwarded Message ---

OK. I may have figured the error.
Although the the key version number for my afs principal is 1,
the 1.2.2 krb524d (using -k) returns a V4 cred with a kvno of 0.
I determined this on the client side, I'll have to walk through the
server code to see why the cred is returned with a kvno of 0.
"Cesar" == Cesar Garcia <[EMAIL PROTECTED]> writes:
Cesar> This is not exactly a Kerberos specific issue, but perhaps
Cesar> the folks on this mailing list might have some insight.
Cesar> I decided for now to go with Ken's suggestion that I simply
Cesar> remove the IP addresses from my V5 tickets, and do ticket
Cesar> forwarding sans IP addresses.
Cesar> It appears that the one dependency we have on IP addresses
Cesar> is k524. Our client code is modern and works fine. It's an
Cesar> old krb524d which we currently run on a CyberSafe KDC that
Cesar> requires IP addresses in the requesting ticket.
Cesar> So thanks to Doug Engert, we have a -k option that allows
Cesar> one to run the MIT krb524d with a keytab, which handles
Cesar> null IP addresses just fine - and I don't immediately, or
Cesar> perhaps ever, have to solve the problem of writing the glue
Cesar> to get it to work the CyberSafe KDB. Simply extracting all
Cesar> the necessary keys to a keytab file suffices.
Cesar> I then add the following keys to a keytab file:
Cesar> 1 - krbtgt/[EMAIL PROTECTED]
Cesar> 2 - [EMAIL PROTECTED] (*)
Cesar> (*) An aside - this predates me, so I'm not sure what all
Cesar> the reasons were) Since all of our AFS cells use the same
Cesar> server principal, we don't have afs/[EMAIL PROTECTED]
Cesar> for each of our cells, just one principal [EMAIL PROTECTED]
Cesar> (one k5realm) for all cells. Not sure how/if this is
Cesar> relevant, but it is different.
Cesar> The basic algorithm for obtaining tokens for all cells follows:
Cesar> 1 - using V5 TGS, obtain a ticket V5 ticket for [EMAIL PROTECTED]
Cesar> (this ticket get's cached)
Cesar> 2 - using k524 and V5 ticket for [EMAIL PROTECTED], obtain a V4 ticket
Cesar> for [EMAIL PROTECTED]
Cesar> 3 - foreach cell, invoke ktc_SetToken, passing in the V4 cred
Cesar> obtained in step 2.
Cesar> This code is implemented in a lib/app we call ak5log and works
Cesar> with the cybersafe based krb524d, with either the cybersafe
Cesar> based k524 client or the MIT based k524 client.
Cesar> When we try to run either the cybersafe or MIT based client
Cesar> against the MIT krb524d (using -k), the ak5log code completes,
Cesar> but I get the following messages in syslog:
Cesar> 
Cesar> Feb 12 21:05:09 imus afs: [ID 255639 kern.notice] afs: Tokens for 
user of AFS id 4843 for cell w.ny.ms.com are discarded (rxkad 
error=19270408)
Cesar> 
Cesar> with a similar error going to my console.
Cesar> krb524init itself seems to work fine against the same MIT
Cesar> krb524d with the keytab. That is the I can V4 tgt and run
Cesar> my v4 apps with no problem.
Cesar> The error apparently corresponds to "Unknown key". I've verified
Cesar> the key and kvno for [EMAIL PROTECTED] that was extracted to the
Cesar> keytab file, and it appears to be correct. I assume I would
Cesar> have failed earlier had that not been the case.
Cesar> When I list my tokens, the listing looks normal.t The
Cesar> tokens themselves, however, are worthless.
Cesar> We're running various versions of transarc afs (3.5, 3.6)
Cesar> on our solaris machines, openafs 1.2.2 on our linux boxes.
Cesar> AFS servers are solaris.
Cesar> Before I go digging into this problem some more, I was wondering
Cesar> if anyone might have some insight on