[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: kpasswd failed to lookup password server from DNS SRV



Hi Mike,

 > Do you have an A record for kerberos.bogus.example.com?
 >
 > In practice I don't recall seeing kpasswd actually use 
_kpasswd._udp.REALM
 > to lookup the kpasswd server. It just uses the kdc according to the
 > krb5.conf. And if that's not set it will try _kerberos._udp.REALM.
 >
 > Is there a firewall in the way?
 >
 > The quickest way to find out what's going on is to get a capture.
 >
 > Mike

Yes, I did add DNS A record kerberos.bogus.example.com. There is no 
firewall in between :-

; <<>> DiG 9.3.2 <<>> kerberos.bogus.example.com
;; global options:  printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 23139
;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 0

;; QUESTION SECTION:
;kerberos.bogus.example.com.    IN    A

;; ANSWER SECTION:
kerberos.bogus.example.com. 53960 IN    CNAME    zeta.example.com.
zeta.example.com.    53960    IN    A    210.17.184.72

;; Query time: 2 msec
;; SERVER: 210.17.184.65#53(210.17.184.65)
;; WHEN: Sun Jun 15 09:59:16 2008
;; MSG SIZE  rcvd: 78


I also tried to change password on the KDC by using kpasswd, and it also 
failed. The KDC log follows :-

2008-06-15T00:54:19 label: default
2008-06-15T00:54:19     dbname: /var/heimdal/heimdal
2008-06-15T00:54:19     mkey_file: /var/heimdal/m-key
2008-06-15T00:54:19     acl_file: /var/heimdal/kadmind.acl
2008-06-15T00:54:19 listening on IPv6:::1 port 88/udp
2008-06-15T00:54:19 listening on IPv6:::1 port 88/tcp
2008-06-15T00:54:19 listening on IPv4:127.0.0.1 port 88/udp
2008-06-15T00:54:19 listening on IPv4:210.17.184.72 port 88/udp
2008-06-15T00:54:19 listening on IPv4:127.0.0.1 port 88/tcp
2008-06-15T00:54:19 listening on IPv4:210.17.184.72 port 88/tcp
2008-06-15T00:54:19 KDC started
2008-06-15T09:49:08 AS-REQ jmok/admin@BOGUS.EXAMPLE.COM from 
IPv4:210.17.184.72 for kadmin/changepw@BOGUS.EXAMPLE.COM
2008-06-15T09:49:08 No preauth found, returning PREAUTH-REQUIRED -- 
jmok/admin@BOGUS.EXAMPLE.COM
2008-06-15T09:49:08 sending 477 bytes to IPv4:210.17.184.72
2008-06-15T09:49:08 AS-REQ jmok/admin@BOGUS.EXAMPLE.COM from 
IPv4:210.17.184.72 for kadmin/changepw@BOGUS.EXAMPLE.COM
2008-06-15T09:49:08 Client sent patypes: encrypted-timestamp
2008-06-15T09:49:08 Looking for PKINIT pa-data -- 
jmok/admin@BOGUS.EXAMPLE.COM
2008-06-15T09:49:08 Looking for ENC-TS pa-data -- 
jmok/admin@BOGUS.EXAMPLE.COM
2008-06-15T09:49:08 ENC-TS Pre-authentication succeeded -- 
jmok/admin@BOGUS.EXAMPLE.COM using aes256-cts-hmac-sha1-96
2008-06-15T09:49:08 Client supported enctypes: aes256-cts-hmac-sha1-96, 
aes128-cts-hmac-sha1-96, des3-cbc-sha1, des3-cbc-md5, arcfour-hmac-md5, 
des-cbc-md5, des-cbc-md4, des-cbc-crc
2008-06-15T09:49:08 Using aes256-cts-hmac-sha1-96/aes256-cts-hmac-sha1-96
2008-06-15T09:49:08 AS-REQ authtime: 2008-06-15T09:49:08 starttime: 
unset endtime: 2008-06-15T09:54:08 renew till: unset
2008-06-15T09:49:08 sending 678 bytes to IPv4:210.17.184.72

Thanks a lot.

John Mok