Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- [root@connect conf]# KRB5_TRACE=/dev/stderr kinit -kt ipa.keytab HTTP/connect.opennms.com
- [8550] 1419288153.271758: Getting initial credentials for HTTP/connect.opennms.com@OPENNMS.COM
- [8550] 1419288153.275480: Looked up etypes in keytab: aes256-cts, aes128-cts, des3-cbc-sha1, rc4-hmac
- [8550] 1419288153.275527: Sending request (198 bytes) to OPENNMS.COM
- [8550] 1419288153.275683: Resolving hostname connect.opennms.com
- [8550] 1419288153.276065: Sending initial UDP request to dgram 66.135.60.215:88
- [8550] 1419288153.279264: Received answer from dgram 66.135.60.215:88
- [8550] 1419288153.279313: Response was not from master KDC
- [8550] 1419288153.279402: Received error from KDC: -1765328359/Additional pre-authentication required
- [8550] 1419288153.279446: Processing preauth types: 136, 19, 2, 133
- [8550] 1419288153.279462: Selected etype info: etype aes256-cts, salt "(null)", params ""
- [8550] 1419288153.279468: Received cookie: MIT
- [8550] 1419288153.279529: Retrieving HTTP/connect.opennms.com@OPENNMS.COM from FILE:ipa.keytab (vno 0, enctype aes256-cts) with result: 0/Success
- [8550] 1419288153.279565: AS key obtained for encrypted timestamp: aes256-cts/AE49
- [8550] 1419288153.279652: Encrypted timestamp (for 1419288153.279570): plain X, encrypted Y
- [8550] 1419288153.279673: Preauth module encrypted_timestamp (2) (flags=1) returned: 0/Success
- [8550] 1419288153.279680: Produced preauth for next request: 133, 2
- [8550] 1419288153.279700: Sending request (293 bytes) to OPENNMS.COM
- [8550] 1419288153.279718: Resolving hostname connect.opennms.com
- [8550] 1419288153.279806: Sending initial UDP request to dgram 66.135.60.215:88
- [8550] 1419288153.337306: Received answer from dgram 66.135.60.215:88
- [8550] 1419288153.337378: Response was not from master KDC
- [8550] 1419288153.337420: Processing preauth types: 19
- [8550] 1419288153.337432: Selected etype info: etype aes256-cts, salt "(null)", params ""
- [8550] 1419288153.337439: Produced preauth for next request: (empty)
- [8550] 1419288153.337446: Salt derived from principal: OPENNMS.COMHTTPconnect.opennms.com
- [8550] 1419288153.337460: AS key determined by preauth: aes256-cts/AE49
- [8550] 1419288153.337544: Decrypted AS reply; session key is: aes256-cts/6405
- [8550] 1419288153.337570: FAST negotiation: available
- [8550] 1419288153.337605: Initializing FILE:/tmp/krb5cc_0 with default princ HTTP/connect.opennms.com@OPENNMS.COM
- [8550] 1419288153.337799: Removing HTTP/connect.opennms.com@OPENNMS.COM -> krbtgt/OPENNMS.COM@OPENNMS.COM from FILE:/tmp/krb5cc_0
- [8550] 1419288153.337812: Storing HTTP/connect.opennms.com@OPENNMS.COM -> krbtgt/OPENNMS.COM@OPENNMS.COM in FILE:/tmp/krb5cc_0
- [8550] 1419288153.337927: Storing config in FILE:/tmp/krb5cc_0 for krbtgt/OPENNMS.COM@OPENNMS.COM: fast_avail: yes
- [8550] 1419288153.337960: Removing HTTP/connect.opennms.com@OPENNMS.COM -> krb5_ccache_conf_data/fast_avail/krbtgt\/OPENNMS.COM\@OPENNMS.COM@X-CACHECONF: from FILE:/tmp/krb5cc_0
- [8550] 1419288153.337972: Storing HTTP/connect.opennms.com@OPENNMS.COM -> krb5_ccache_conf_data/fast_avail/krbtgt\/OPENNMS.COM\@OPENNMS.COM@X-CACHECONF: in FILE:/tmp/krb5cc_0
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement