[33348] in Kerberos

home help back first fref pref prev next nref lref last post

Re: Multiple hostnames with same IP address (DNS A record)

daemon@ATHENA.MIT.EDU (petesea@bigfoot.com)
Wed Apr 27 15:24:49 2011

Date: Wed, 27 Apr 2011 12:24:38 -0700 (PDT)
From: petesea@bigfoot.com
To: "kerberos@mit.edu" <kerberos@mit.edu>
In-Reply-To: <1303928647.2493.76.camel@t410>
Message-ID: <alpine.OSX.2.00.1104271129340.782@nikto-air>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: kerberos-bounces@mit.edu

On Wed, 27 Apr 2011, Greg Hudson wrote:

> I'm not entirely sure what's going wrong, but I can explain this part, I 
> think.  Solaris Kerberos defaults to not doing reverse canonicalization 
> of hosts, and OSX may do so as well.

Does this happen on Solaris even if the Kerberos used is MIT Kerberos?

This particular solaris client is using OpenSSH 5.0p1 w/gssapi-keyex that 
was statically linked with MIT Kerberos 1.6.3.

>> There are "host" principals for both hostnames in /etc/krb5.keytab and
>> GSSAPIStrictAcceptorCheck is set to "no" in sshd_config.
>
> I would expect the authentication exchange to work regardless of which 
> service principal the client chooses, in this configuration.  If you can 
> get the sshd -d output on the server, there might be some enlightening 
> information there.

I have tried sshd -e -ddd, but don't see any clues... at least nothing 
that helps me.

>From the server-side it just seems to close the connection.   Here's the 
last bit of the debug output from a failed connection:

   ...
   debug2: set_newkeys: mode 1
   debug1: SSH2_MSG_NEWKEYS sent
   debug1: expecting SSH2_MSG_NEWKEYS
   debug2: monitor_read: 51 used once, disabling now
   debug3: mm_request_receive entering
   Connection closed by 1.2.3.4

And here's that same section of debug output from a successful connection:

   ...
   debug2: set_newkeys: mode 1
   debug1: SSH2_MSG_NEWKEYS sent
   debug1: expecting SSH2_MSG_NEWKEYS
   debug2: monitor_read: 51 used once, disabling now
   debug3: mm_request_receive entering
   debug2: set_newkeys: mode 0
   debug1: SSH2_MSG_NEWKEYS received
   debug1: KEX done
   ...

> It's conceivable that the client is performing the canonicalization step 
> twice and getting different answers, but I don't know what the details 
> of that scenario would be.

This is what I've suspected, but not sure how to verify it.
________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

home help back first fref pref prev next nref lref last post