Skip Menu |
 

Date: Thu, 29 Apr 2004 18:28:22 -0500
From: "Lantzer, Ryan" <lantzer@umr.edu>
To: <krb5-bugs@mit.edu>
Subject: Problems with ms2mit.exe and aklog.exe with KFW 2.6.1 and OpenAFS
Download (untitled) / with headers
text/plain 2.5KiB
The ms2mit.exe package included with KFW 2.6.1 loads a TGT into the MIT
credentials cache that has an encryption type of arcfour-hmac, after
logging into a Windows XP system joined to a Windows 2000 native mode
domain. The aklog.exe included with KFW 2.6.1 does not seem to be able
to use a TGT with this encryption type. I noticed in the ms2mit.exe
source code that the code was changed to use the TGT from the Microsoft
credentials cache if the encryption type was a supported type, and that
arcfour-hmac was listed as a supported type. If aklog.exe cannot be used
with an arcfour-hmac encryption type, then perhaps the ms2mit.exe code
should check the krb5.ini file for requested encryption types and
attempt to acquire a TGT with a requested encryption type if one isn't
returned from the Microsoft credentials cache.

I am able to use leash32.exe from KFW 2.6.1 to get AFS tokens, but it
does not work when I try to use ms2mit.exe and aklog.exe from KFW 2.6.1.

The following is an edited log of my attempt to use aklog.exe with
ms2mit.exe from KFW 2.6.1:

C:\>ms2mit

C:\>klist -e
Ticket cache: API:krb5cc
Default principal: userid@REALM

Valid starting Expires Service principal
04/29/04 17:58:02 05/29/04 17:58:02 krbtgt/REALM@REALM
renew until 05/29/04 17:58:02, Etype (skey, tkt): ArcFour with
HMAC/md5,
ArcFour with HMAC/md5


Kerberos 4 ticket cache: API:krb4cc
klist: No ticket file (tf_util)

C:\>aklog -d
Authenticating to cell CELL.
Getting v5 tickets: afs/CELL@REALM
Kerberos error code returned by get_cred: -1765328184
aklog: Couldn't get umr.edu AFS tickets:

C:\>


Show quoted text
>From a web search:

-1765328184: Invalid KDC option combination (library internal error)


I also have problems when trying to use kinit.exe and aklog.exe from KFW
2.6.1. I did not have this problem with KFW 2.6-beta9.

The following is an edited log of my attempt to use aklog.exe with
kinit.exe from KFW 2.6.1:

C:\>kinit -5
Password for userid@REALM:

C:\>klist -e
Ticket cache: API:krb5cc
Default principal: userid@REALM

Valid starting Expires Service principal
04/29/04 18:21:57 04/30/04 04:21:57 krbtgt/REALM@REALM
Etype (skey, tkt): DES cbc mode with CRC-32, DES cbc mode with
CRC-32


Kerberos 4 ticket cache: API:krb4cc
klist: No ticket file (tf_util)

C:\>aklog -d
Authenticating to cell umr.edu.
Getting v5 tickets: afs/CELL@REALM
Set username to userid
Getting tokens.
aklog: unable to obtain tokens for cell CELL (status: 11862786).

C:\>

Show quoted text
>From a web search:

KTC_INVAL 11862786 /* an invalid argument was passed in */

Ryan Lantzer
Date: Sun, 02 May 2004 22:40:39 -0400
From: Jeffrey Altman <jaltman@columbia.edu>
To: rt-comment@krbdev.mit.edu
Cc: krb5-prs@MIT.EDU
Subject: Re: [krbdev.mit.edu #2550] Problems with ms2mit.exe and aklog.exe with KFW 2.6.1 and OpenAFS
RT-Send-Cc:
Download (untitled) / with headers
text/plain 3.1KiB
RC4-HMAC is a supported type and it can be successfully used to
obtain a DES-CBC-CRC Kerberos 5 afs/cellname@REALM or afs@REALM
ticket for use in converting to a token.

Run aklog.exe with the -d option and report the actual error.

Leash and aklog share slightly different code bases for obtaining tokens.
However, they are roughly equivalent.

""Lantzer@MIT.EDU wrote:

Show quoted text
>The ms2mit.exe package included with KFW 2.6.1 loads a TGT into the MIT
>credentials cache that has an encryption type of arcfour-hmac, after
>logging into a Windows XP system joined to a Windows 2000 native mode
>domain. The aklog.exe included with KFW 2.6.1 does not seem to be able
>to use a TGT with this encryption type. I noticed in the ms2mit.exe
>source code that the code was changed to use the TGT from the Microsoft
>credentials cache if the encryption type was a supported type, and that
>arcfour-hmac was listed as a supported type. If aklog.exe cannot be used
>with an arcfour-hmac encryption type, then perhaps the ms2mit.exe code
>should check the krb5.ini file for requested encryption types and
>attempt to acquire a TGT with a requested encryption type if one isn't
>returned from the Microsoft credentials cache.
>
>I am able to use leash32.exe from KFW 2.6.1 to get AFS tokens, but it
>does not work when I try to use ms2mit.exe and aklog.exe from KFW 2.6.1.
>
>The following is an edited log of my attempt to use aklog.exe with
>ms2mit.exe from KFW 2.6.1:
>
>C:\>ms2mit
>
>C:\>klist -e
>Ticket cache: API:krb5cc
>Default principal: userid@REALM
>
>Valid starting Expires Service principal
>04/29/04 17:58:02 05/29/04 17:58:02 krbtgt/REALM@REALM
> renew until 05/29/04 17:58:02, Etype (skey, tkt): ArcFour with
>HMAC/md5,
> ArcFour with HMAC/md5
>
>
>Kerberos 4 ticket cache: API:krb4cc
>klist: No ticket file (tf_util)
>
>C:\>aklog -d
>Authenticating to cell CELL.
>Getting v5 tickets: afs/CELL@REALM
>Kerberos error code returned by get_cred: -1765328184
>aklog: Couldn't get umr.edu AFS tickets:
>
>C:\>
>
>
>>From a web search:
>
>-1765328184: Invalid KDC option combination (library internal error)
>
>
>I also have problems when trying to use kinit.exe and aklog.exe from KFW
>2.6.1. I did not have this problem with KFW 2.6-beta9.
>
>The following is an edited log of my attempt to use aklog.exe with
>kinit.exe from KFW 2.6.1:
>
>C:\>kinit -5
>Password for userid@REALM:
>
>C:\>klist -e
>Ticket cache: API:krb5cc
>Default principal: userid@REALM
>
>Valid starting Expires Service principal
>04/29/04 18:21:57 04/30/04 04:21:57 krbtgt/REALM@REALM
> Etype (skey, tkt): DES cbc mode with CRC-32, DES cbc mode with
>CRC-32
>
>
>Kerberos 4 ticket cache: API:krb4cc
>klist: No ticket file (tf_util)
>
>C:\>aklog -d
>Authenticating to cell umr.edu.
>Getting v5 tickets: afs/CELL@REALM
>Set username to userid
>Getting tokens.
>aklog: unable to obtain tokens for cell CELL (status: 11862786).
>
>C:\>
>
>>From a web search:
>
>KTC_INVAL 11862786 /* an invalid argument was passed in */
>
>Ryan Lantzer
>
>_______________________________________________
>krb5-bugs mailing list
>krb5-bugs@mit.edu
>https://mailman.mit.edu/mailman/listinfo/krb5-bugs
>
Date: Sun, 02 May 2004 22:45:45 -0400
From: Jeffrey Altman <jaltman@columbia.edu>
To: rt-comment@krbdev.mit.edu
Cc: krb5-prs@MIT.EDU
Subject: Re: [krbdev.mit.edu #2550] Problems with ms2mit.exe and aklog.exe with KFW 2.6.1 and OpenAFS
RT-Send-Cc:
Sorry, I missed the fact that you did include the aklog -d output.

What version of AFS client are you using?
Download (untitled) / with headers
text/plain 4.6KiB
Tested on Windows 2003 with KFW 2.6.1 and OpenAFS 1.3.6390
Here is the klist output after the successful aklog.exe. Please notice
that all tickets are RC4-HMAC except for the afs ticket which is
DES-CBC-MD5.

[D:\WINDOWS]aklog -d
Authenticating to cell windows.secure-endpoints.com.
Getting v5 tickets:
afs/windows.secure-endpoints.com@WINDOWS.SECURE-ENDPOINTS.COM
Set username to Administrator
Getting tokens.

[D:\WINDOWS]"\Program Files\mit\Kerberos\bin"\klist -e
Ticket cache: API:krb5cc
Default principal: Administrator@WINDOWS.SECURE-ENDPOINTS.COM

Valid starting Expires Service principal
05/02/04 23:10:45 05/03/04 09:08:02
krbtgt/WINDOWS.SECURE-ENDPOINTS.COM@WINDOWS.SECURE-ENDPOINTS.COM
renew until 05/09/04 23:08:02, Etype (skey, tkt): ArcFour with
HMAC/md5, ArcFour with HMAC/md5
05/02/04 23:08:02 05/03/04 09:08:02
krbtgt/WINDOWS.SECURE-ENDPOINTS.COM@WINDOWS.SECURE-ENDPOINTS.COM
renew until 05/09/04 23:08:02, Etype (skey, tkt): ArcFour with
HMAC/md5, ArcFour with HMAC/md5
05/02/04 23:08:26 05/03/04 09:08:02
cifs/dc.windows.secure-endpoints.com@WINDOWS.SECURE-ENDPOINTS.COM
renew until 05/09/04 23:08:02, Etype (skey, tkt): ArcFour with
HMAC/md5, ArcFour with HMAC/md5
05/02/04 23:08:26 05/03/04 09:08:02
ldap/dc.windows.secure-endpoints.com/windows.secure-endpoints.com@WINDOWS.SECURE-ENDPOINTS.COM
renew until 05/09/04 23:08:02, Etype (skey, tkt): ArcFour with
HMAC/md5, ArcFour with HMAC/md5
05/02/04 23:08:02 05/03/04 09:08:02
host/dc.windows.secure-endpoints.com@WINDOWS.SECURE-ENDPOINTS.COM
renew until 05/09/04 23:08:02, Etype (skey, tkt): ArcFour with
HMAC/md5, ArcFour with HMAC/md5
05/02/04 23:10:45 05/03/04 09:08:02
afs/windows.secure-endpoints.com@WINDOWS.SECURE-ENDPOINTS.COM
renew until 05/09/04 23:08:02, Etype (skey, tkt): DES cbc mode
with CRC-32, DES cbc mode with RSA-MD5

and here is another example starting with a Run As cmd.exe session. I
use ms2mit to import Windows KDC TGT and then obtain tokens for two
cells with aklog. One from the Windows KDC and another from a
cross-realm MIT KDC.

[C:\4nt401]"d:\Program Files\mit\Kerberos\bin"\klist -e
klist: No credentials cache found (ticket cache API:krb5cc)


Kerberos 4 ticket cache: API:krb4cc
klist: No ticket file (tf_util)

[C:\4nt401]ms2mit

[C:\4nt401]"d:\Program Files\mit\Kerberos\bin"\klist -e
Ticket cache: API:krb5cc
Default principal: jaltman@WINDOWS.SECURE-ENDPOINTS.COM

Valid starting Expires Service principal
05/02/04 23:18:58 05/03/04 09:18:58
krbtgt/WINDOWS.SECURE-ENDPOINTS.COM@WINDOWS.SECURE-ENDPOINTS.COM
renew until 05/09/04 23:18:58, Etype (skey, tkt): ArcFour with
HMAC/md5, ArcFour with HMAC/md5
05/02/04 23:18:58 05/03/04 09:18:58
host/dc.windows.secure-endpoints.com@WINDOWS.SECURE-ENDPOINTS.COM
renew until 05/09/04 23:18:58, Etype (skey, tkt): ArcFour with
HMAC/md5, ArcFour with HMAC/md5


Kerberos 4 ticket cache: API:krb4cc
klist: No ticket file (tf_util)

[C:\4nt401]aklog -d
Authenticating to cell windows.secure-endpoints.com.
Getting v5 tickets:
afs/windows.secure-endpoints.com@WINDOWS.SECURE-ENDPOINTS.COM
Set username to jaltman
Getting tokens.

[C:\4nt401]aklog -c secure-endpoints.com -d
Authenticating to cell secure-endpoints.com.
Getting v5 tickets: afs/secure-endpoints.com@SECURE-ENDPOINTS.COM
Getting v5 tickets: afs@SECURE-ENDPOINTS.COM
Set username to jaltman@WINDOWS.SECURE-ENDPOINTS.COM
Getting tokens.

[C:\4nt401]"d:\Program Files\mit\Kerberos\bin"\klist -e
Ticket cache: API:krb5cc
Default principal: jaltman@WINDOWS.SECURE-ENDPOINTS.COM

Valid starting Expires Service principal
05/02/04 23:18:58 05/03/04 09:18:58
krbtgt/WINDOWS.SECURE-ENDPOINTS.COM@WINDOWS.SECURE-ENDPOINTS.COM
renew until 05/09/04 23:18:58, Etype (skey, tkt): ArcFour with
HMAC/md5, ArcFour with HMAC/md5
05/02/04 23:18:58 05/03/04 09:18:58
host/dc.windows.secure-endpoints.com@WINDOWS.SECURE-ENDPOINTS.COM
renew until 05/09/04 23:18:58, Etype (skey, tkt): ArcFour with
HMAC/md5, ArcFour with HMAC/md5
05/02/04 23:19:41 05/03/04 09:18:58
afs/windows.secure-endpoints.com@WINDOWS.SECURE-ENDPOINTS.COM
renew until 05/09/04 23:18:58, Etype (skey, tkt): DES cbc mode
with CRC-32, DES cbc mode with RSA-MD5
05/02/04 23:18:58 05/03/04 09:18:58
krbtgt/SECURE-ENDPOINTS.COM@WINDOWS.SECURE-ENDPOINTS.COM
renew until 05/09/04 23:18:58, Etype (skey, tkt): ArcFour with
HMAC/md5, ArcFour with HMAC/md5
05/02/04 23:19:59 05/03/04 09:18:58 afs@SECURE-ENDPOINTS.COM
renew until 05/09/04 23:18:58, Etype (skey, tkt): DES cbc mode
with CRC-32, DES cbc mode with CRC-32


Kerberos 4 ticket cache: API:krb4cc
klist: No ticket file (tf_util)

Clearly there is something else preventing the proper operation of your
configuration.
no further feedback.