[38469] in Kerberos

home help back first fref pref prev next nref lref last post

Re: KDC 1.15.1 - addprinc random failure

daemon@ATHENA.MIT.EDU (Yegui Cai)
Sat Feb 2 09:36:54 2019

MIME-Version: 1.0
In-Reply-To: <CAJYMFR5+5tp6g9UNyreZzmvf+nscE5kZA7tsWSvPffdBE3m=gQ@mail.gmail.com>
From: Yegui Cai <caiyegui@gmail.com>
Date: Sat, 2 Feb 2019 09:36:32 -0500
Message-ID: <CAJYMFR4DKQEOhPmK5jLmM+LgjQ_UPhAxtf4tSvZCZ0uxHzv9ww@mail.gmail.com>
To: kerberos@mit.edu
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: kerberos-bounces@mit.edu

Hi all.
I just found out that the issue was caused by some race conditions when I
experiment with master-master deployment. Please ignore this thread.
Cheers,
Yegui

On Fri, Feb 1, 2019 at 11:20 AM Yegui Cai <caiyegui@gmail.com> wrote:

> Hi all.
>
> I run KDC 1.15.1. At the host, I use kadmin.local to add a principle. Very
> strange that my first attempt failed silently while the second attempt
> succeeded. Here are the steps:
>
> [root@gamma-hactive ~]# kadmin.local
> Authenticating as principal hdfs/admin@EXAMPLE.COM with password.
> kadmin.local:  addprinc yegui
> WARNING: no policy specified for yegui@EXAMPLE.COM; defaulting to no
> policy
> Enter password for principal "yegui@EXAMPLE.COM":
> Re-enter password for principal "yegui@EXAMPLE.COM":
> Principal "yegui@EXAMPLE.COM" created.
> kadmin.local:  getprinc yegui
> get_principal: Principal does not exist while retrieving "
> yegui@EXAMPLE.COM".
> kadmin.local:  addprinc yegui
> WARNING: no policy specified for yegui@EXAMPLE.COM; defaulting to no
> policy
> Enter password for principal "yegui@EXAMPLE.COM":
> Re-enter password for principal "yegui@EXAMPLE.COM":
> Principal "yegui@EXAMPLE.COM" created.
> kadmin.local:  getprinc yegui
> Principal: yegui@EXAMPLE.COM
> Expiration date: [never]
> Last password change: Fri Feb 01 16:00:09 UTC 2019
> Password expiration date: [never]
> Maximum ticket life: 1 day 00:00:00
> Maximum renewable life: 7 days 00:00:00
> Last modified: Fri Feb 01 16:00:09 UTC 2019 (hdfs/admin@EXAMPLE.COM)
> Last successful authentication: [never]
> Last failed authentication: [never]
> Failed password attempts: 0
> Number of keys: 4
> Key: vno 1, aes256-cts-hmac-sha1-96
> Key: vno 1, aes128-cts-hmac-sha1-96
> Key: vno 1, des3-cbc-sha1
> Key: vno 1, arcfour-hmac
> MKey: vno 1
> Attributes: REQUIRES_PRE_AUTH
> Policy: [none]
>
> Any idea? Thanks!
> Yegui
>
________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

home help back first fref pref prev next nref lref last post