[19525] in Kerberos

home help back first fref pref prev next nref lref last post

Re: Decrypt integrity check failed

daemon@ATHENA.MIT.EDU (Donn Cave)
Tue Jul 8 13:12:30 2003

From: Donn Cave <donn@u.washington.edu>
Date: Tue, 08 Jul 2003 09:44:12 -0700
Message-ID: <donn-F57EF7.09441208072003@nntp1.u.washington.edu>
To: kerberos@MIT.EDU
Errors-To: kerberos-bounces@mit.edu

In article <20030708033815.35159.qmail@web40511.mail.yahoo.com>,
 reahan2001@yahoo.com (Muhammed Reahan) wrote:

> Decrypt integrity check failed
> First of all I created a principal name test. It is successfully created
> i entered the password  for it two times.
...
> Then i added the entry for the principal in the keytab file as 
> 
> kadmin.local: ktadd test
> Entry for principal test with kvno 2, encryption type DES-CBC-CRC added to 
> keytab 
> WRFILE:/etc/krb5/krb5.keytab.
...
>    Now i want to get the ticket of principal test  with kinit command.
>    
>    kinit test
> Password for test@VISION.PAF: 
> kinit: Password incorrect
> i entered the password correctly which i entered the first time.But 
> automatically password is 
> changed. i have tried this with two or three principals.

Yes, ktadmin invents a pseudo-random key when it adds a keytab
entry, so there is no way to subsequently authenticate with a
password.  If you want a keytab entry and a known password, you
have to use ktutil to create it.  I think ideally this would very
rarely be necessary.

   Donn Cave, donn@u.washington.edu
________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

home help back first fref pref prev next nref lref last post