Advertisement
Guest User

Untitled

a guest
Dec 22nd, 2014
149
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.07 KB | None | 0 0
  1. [root@connect conf]# KRB5_TRACE=/dev/stderr kinit -kt ipa.keytab HTTP/connect.opennms.com
  2. [8550] 1419288153.271758: Getting initial credentials for HTTP/connect.opennms.com@OPENNMS.COM
  3. [8550] 1419288153.275480: Looked up etypes in keytab: aes256-cts, aes128-cts, des3-cbc-sha1, rc4-hmac
  4. [8550] 1419288153.275527: Sending request (198 bytes) to OPENNMS.COM
  5. [8550] 1419288153.275683: Resolving hostname connect.opennms.com
  6. [8550] 1419288153.276065: Sending initial UDP request to dgram 66.135.60.215:88
  7. [8550] 1419288153.279264: Received answer from dgram 66.135.60.215:88
  8. [8550] 1419288153.279313: Response was not from master KDC
  9. [8550] 1419288153.279402: Received error from KDC: -1765328359/Additional pre-authentication required
  10. [8550] 1419288153.279446: Processing preauth types: 136, 19, 2, 133
  11. [8550] 1419288153.279462: Selected etype info: etype aes256-cts, salt "(null)", params ""
  12. [8550] 1419288153.279468: Received cookie: MIT
  13. [8550] 1419288153.279529: Retrieving HTTP/connect.opennms.com@OPENNMS.COM from FILE:ipa.keytab (vno 0, enctype aes256-cts) with result: 0/Success
  14. [8550] 1419288153.279565: AS key obtained for encrypted timestamp: aes256-cts/AE49
  15. [8550] 1419288153.279652: Encrypted timestamp (for 1419288153.279570): plain X, encrypted Y
  16. [8550] 1419288153.279673: Preauth module encrypted_timestamp (2) (flags=1) returned: 0/Success
  17. [8550] 1419288153.279680: Produced preauth for next request: 133, 2
  18. [8550] 1419288153.279700: Sending request (293 bytes) to OPENNMS.COM
  19. [8550] 1419288153.279718: Resolving hostname connect.opennms.com
  20. [8550] 1419288153.279806: Sending initial UDP request to dgram 66.135.60.215:88
  21. [8550] 1419288153.337306: Received answer from dgram 66.135.60.215:88
  22. [8550] 1419288153.337378: Response was not from master KDC
  23. [8550] 1419288153.337420: Processing preauth types: 19
  24. [8550] 1419288153.337432: Selected etype info: etype aes256-cts, salt "(null)", params ""
  25. [8550] 1419288153.337439: Produced preauth for next request: (empty)
  26. [8550] 1419288153.337446: Salt derived from principal: OPENNMS.COMHTTPconnect.opennms.com
  27. [8550] 1419288153.337460: AS key determined by preauth: aes256-cts/AE49
  28. [8550] 1419288153.337544: Decrypted AS reply; session key is: aes256-cts/6405
  29. [8550] 1419288153.337570: FAST negotiation: available
  30. [8550] 1419288153.337605: Initializing FILE:/tmp/krb5cc_0 with default princ HTTP/connect.opennms.com@OPENNMS.COM
  31. [8550] 1419288153.337799: Removing HTTP/connect.opennms.com@OPENNMS.COM -> krbtgt/OPENNMS.COM@OPENNMS.COM from FILE:/tmp/krb5cc_0
  32. [8550] 1419288153.337812: Storing HTTP/connect.opennms.com@OPENNMS.COM -> krbtgt/OPENNMS.COM@OPENNMS.COM in FILE:/tmp/krb5cc_0
  33. [8550] 1419288153.337927: Storing config in FILE:/tmp/krb5cc_0 for krbtgt/OPENNMS.COM@OPENNMS.COM: fast_avail: yes
  34. [8550] 1419288153.337960: Removing HTTP/connect.opennms.com@OPENNMS.COM -> krb5_ccache_conf_data/fast_avail/krbtgt\/OPENNMS.COM\@OPENNMS.COM@X-CACHECONF: from FILE:/tmp/krb5cc_0
  35. [8550] 1419288153.337972: Storing HTTP/connect.opennms.com@OPENNMS.COM -> krb5_ccache_conf_data/fast_avail/krbtgt\/OPENNMS.COM\@OPENNMS.COM@X-CACHECONF: in FILE:/tmp/krb5cc_0
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement