[31781] in Kerberos
Re: Kerberos tickets, SSH public key auth, AFS tokens
daemon@ATHENA.MIT.EDU (Russ Allbery)
Wed Dec 16 20:34:48 2009
From: Russ Allbery <rra@stanford.edu>
To: Jeff Blaine <jblaine@stage-infinity.com>
In-Reply-To: <4B297B85.4000305@stage-infinity.com> (Jeff Blaine's message of
"Wed, 16 Dec 2009 19:29:57 -0500")
Date: Wed, 16 Dec 2009 17:33:45 -0800
Message-ID: <87iqc6z8na.fsf@windlord.stanford.edu>
MIME-Version: 1.0
Cc: kerberos@mit.edu
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: kerberos-bounces@mit.edu
Jeff Blaine <jblaine@stage-infinity.com> writes:
> sshd[20489]: [ID 237248 auth.debug] (pam_afs_session):
> pam_sm_open_session: entry (0x0)
> sshd[20489]: [ID 237248 auth.debug] (pam_afs_session): skipping tokens,
> no Kerberos ticket cache
Hm, are you sure that tickets are being forwarded? In other words, after
login, if you run klist, do you have a ticket cache?
(It's expected that pam-krb5 will do nothing in the case of GSSAPI
authentication.)
--
Russ Allbery (rra@stanford.edu) <http://www.eyrie.org/~eagle/>
________________________________________________
Kerberos mailing list Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos