Advertisement
Guest User

Untitled

a guest
May 11th, 2022
77
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 48.35 KB | None | 0 0
  1. [root@epmtestapp sssd]# cat ldap_child.log
  2. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172413]]]] [main] (0x0400): ldap_child started.
  3. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172413]]]] [main] (0x2000): context initialized
  4. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172413]]]] [unpack_buffer] (0x1000): total buffer size: 74
  5. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172413]]]] [unpack_buffer] (0x1000): realm_str size: 17
  6. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172413]]]] [unpack_buffer] (0x1000): got realm_str: XXX
  7. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172413]]]] [unpack_buffer] (0x1000): princ_str size: 33
  8. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172413]]]] [unpack_buffer] (0x1000): got princ_str: host/epmtestapp.xxx
  9. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172413]]]] [unpack_buffer] (0x1000): keytab_name size: 0
  10. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172413]]]] [unpack_buffer] (0x1000): lifetime: 86400
  11. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172413]]]] [unpack_buffer] (0x0200): Will run as [0][0].
  12. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172413]]]] [privileged_krb5_setup] (0x2000): Kerberos context initialized
  13. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172413]]]] [main] (0x2000): Kerberos context initialized
  14. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172413]]]] [become_user] (0x0200): Trying to become user [0][0].
  15. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172413]]]] [become_user] (0x0200): Already user [0].
  16. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172413]]]] [main] (0x2000): Running as [0][0].
  17. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172413]]]] [main] (0x2000): getting TGT sync
  18. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172413]]]] [ldap_child_get_tgt_sync] (0x2000): got realm_name: [XXX]
  19. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172413]]]] [ldap_child_get_tgt_sync] (0x0100): Principal name is: [host/epmtestapp.xxx@XXX]
  20. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172413]]]] [ldap_child_get_tgt_sync] (0x0100): Using keytab [MEMORY:/etc/krb5.keytab]
  21. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172413]]]] [ldap_child_get_tgt_sync] (0x0100): Will canonicalize principals
  22. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172413]]]] [sss_child_krb5_trace_cb] (0x4000): [172413] 1652280536.364382: Getting initial credentials for host/epmtestapp.xxx@XXX
  23.  
  24. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172413]]]] [sss_child_krb5_trace_cb] (0x4000): [172413] 1652280536.364447: Looked up etypes in keytab: aes256-cts, aes128-cts
  25.  
  26. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172413]]]] [sss_child_krb5_trace_cb] (0x4000): [172413] 1652280536.364472: Sending request (219 bytes) to XXX
  27.  
  28. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172413]]]] [sss_child_krb5_trace_cb] (0x4000): [172413] 1652280536.364710: Initiating TCP connection to stream 192.168.100.231:88
  29.  
  30. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172413]]]] [sss_child_krb5_trace_cb] (0x4000): [172413] 1652280536.365080: Sending TCP request to stream 192.168.100.231:88
  31.  
  32. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172413]]]] [sss_child_krb5_trace_cb] (0x4000): [172413] 1652280536.365882: Received answer from stream 192.168.100.231:88
  33.  
  34. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172413]]]] [sss_child_krb5_trace_cb] (0x4000): [172413] 1652280536.365935: Response was from master KDC
  35.  
  36. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172413]]]] [sss_child_krb5_trace_cb] (0x4000): [172413] 1652280536.365952: Received error from KDC: -1765328378/Client not found in Kerberos database
  37.  
  38. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172413]]]] [ldap_child_get_tgt_sync] (0x0010): Failed to init credentials: Client 'host/epmtestapp.xxx@XXX' not found in Kerberos database
  39. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172413]]]] [unique_filename_destructor] (0x2000): Unlinking [/var/lib/sss/db/ccache_XXX_JNyKVr]
  40. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172413]]]] [main] (0x0020): ldap_child_get_tgt_sync failed.
  41. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172413]]]] [prepare_response] (0x0400): Building response for result [-1765328378]
  42. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172413]]]] [pack_buffer] (0x2000): response size: 57
  43. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172413]]]] [pack_buffer] (0x1000): result [14] krberr [-1765328378] msgsize [37] msg [Client not found in Kerberos database]
  44. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172413]]]] [main] (0x0400): ldap_child completed successfully
  45. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172414]]]] [main] (0x0400): ldap_child started.
  46. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172414]]]] [main] (0x2000): context initialized
  47. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172414]]]] [unpack_buffer] (0x1000): total buffer size: 74
  48. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172414]]]] [unpack_buffer] (0x1000): realm_str size: 17
  49. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172414]]]] [unpack_buffer] (0x1000): got realm_str: XXX
  50. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172414]]]] [unpack_buffer] (0x1000): princ_str size: 33
  51. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172414]]]] [unpack_buffer] (0x1000): got princ_str: host/epmtestapp.xxx
  52. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172414]]]] [unpack_buffer] (0x1000): keytab_name size: 0
  53. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172414]]]] [unpack_buffer] (0x1000): lifetime: 86400
  54. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172414]]]] [unpack_buffer] (0x0200): Will run as [0][0].
  55. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172414]]]] [privileged_krb5_setup] (0x2000): Kerberos context initialized
  56. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172414]]]] [main] (0x2000): Kerberos context initialized
  57. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172414]]]] [become_user] (0x0200): Trying to become user [0][0].
  58. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172414]]]] [become_user] (0x0200): Already user [0].
  59. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172414]]]] [main] (0x2000): Running as [0][0].
  60. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172414]]]] [main] (0x2000): getting TGT sync
  61. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172414]]]] [ldap_child_get_tgt_sync] (0x2000): got realm_name: [XXX]
  62. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172414]]]] [ldap_child_get_tgt_sync] (0x0100): Principal name is: [host/epmtestapp.xxx@XXX]
  63. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172414]]]] [ldap_child_get_tgt_sync] (0x0100): Using keytab [MEMORY:/etc/krb5.keytab]
  64. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172414]]]] [ldap_child_get_tgt_sync] (0x0100): Will canonicalize principals
  65. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172414]]]] [sss_child_krb5_trace_cb] (0x4000): [172414] 1652280536.374457: Getting initial credentials for host/epmtestapp.xxx@XXX
  66.  
  67. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172414]]]] [sss_child_krb5_trace_cb] (0x4000): [172414] 1652280536.374516: Looked up etypes in keytab: aes256-cts, aes128-cts
  68.  
  69. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172414]]]] [sss_child_krb5_trace_cb] (0x4000): [172414] 1652280536.374545: Sending request (219 bytes) to XXX
  70.  
  71. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172414]]]] [sss_child_krb5_trace_cb] (0x4000): [172414] 1652280536.374704: Initiating TCP connection to stream 192.168.100.232:88
  72.  
  73. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172414]]]] [sss_child_krb5_trace_cb] (0x4000): [172414] 1652280536.375214: Sending TCP request to stream 192.168.100.232:88
  74.  
  75. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172414]]]] [sss_child_krb5_trace_cb] (0x4000): [172414] 1652280536.376856: Received answer from stream 192.168.100.232:88
  76.  
  77. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172414]]]] [sss_child_krb5_trace_cb] (0x4000): [172414] 1652280536.376905: Response was from master KDC
  78.  
  79. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172414]]]] [sss_child_krb5_trace_cb] (0x4000): [172414] 1652280536.376923: Received error from KDC: -1765328378/Client not found in Kerberos database
  80.  
  81. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172414]]]] [ldap_child_get_tgt_sync] (0x0010): Failed to init credentials: Client 'host/epmtestapp.xxx@XXX' not found in Kerberos database
  82. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172414]]]] [unique_filename_destructor] (0x2000): Unlinking [/var/lib/sss/db/ccache_XXX_KSKvvr]
  83. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172414]]]] [main] (0x0020): ldap_child_get_tgt_sync failed.
  84. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172414]]]] [prepare_response] (0x0400): Building response for result [-1765328378]
  85. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172414]]]] [pack_buffer] (0x2000): response size: 57
  86. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172414]]]] [pack_buffer] (0x1000): result [14] krberr [-1765328378] msgsize [37] msg [Client not found in Kerberos database]
  87. (Wed May 11 15:48:56 2022) [[sssd[ldap_child[172414]]]] [main] (0x0400): ldap_child completed successfully
  88. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172420]]]] [main] (0x0400): ldap_child started.
  89. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172420]]]] [main] (0x2000): context initialized
  90. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172420]]]] [unpack_buffer] (0x1000): total buffer size: 74
  91. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172420]]]] [unpack_buffer] (0x1000): realm_str size: 17
  92. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172420]]]] [unpack_buffer] (0x1000): got realm_str: XXX
  93. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172420]]]] [unpack_buffer] (0x1000): princ_str size: 33
  94. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172420]]]] [unpack_buffer] (0x1000): got princ_str: host/epmtestapp.xxx
  95. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172420]]]] [unpack_buffer] (0x1000): keytab_name size: 0
  96. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172420]]]] [unpack_buffer] (0x1000): lifetime: 86400
  97. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172420]]]] [unpack_buffer] (0x0200): Will run as [0][0].
  98. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172420]]]] [privileged_krb5_setup] (0x2000): Kerberos context initialized
  99. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172420]]]] [main] (0x2000): Kerberos context initialized
  100. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172420]]]] [become_user] (0x0200): Trying to become user [0][0].
  101. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172420]]]] [become_user] (0x0200): Already user [0].
  102. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172420]]]] [main] (0x2000): Running as [0][0].
  103. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172420]]]] [main] (0x2000): getting TGT sync
  104. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172420]]]] [ldap_child_get_tgt_sync] (0x2000): got realm_name: [XXX]
  105. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172420]]]] [ldap_child_get_tgt_sync] (0x0100): Principal name is: [host/epmtestapp.xxx@XXX]
  106. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172420]]]] [ldap_child_get_tgt_sync] (0x0100): Using keytab [MEMORY:/etc/krb5.keytab]
  107. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172420]]]] [ldap_child_get_tgt_sync] (0x0100): Will canonicalize principals
  108. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172420]]]] [sss_child_krb5_trace_cb] (0x4000): [172420] 1652280542.387693: Getting initial credentials for host/epmtestapp.xxx@XXX
  109.  
  110. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172420]]]] [sss_child_krb5_trace_cb] (0x4000): [172420] 1652280542.387752: Looked up etypes in keytab: aes256-cts, aes128-cts
  111.  
  112. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172420]]]] [sss_child_krb5_trace_cb] (0x4000): [172420] 1652280542.387778: Sending request (219 bytes) to XXX
  113.  
  114. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172420]]]] [sss_child_krb5_trace_cb] (0x4000): [172420] 1652280542.387909: Initiating TCP connection to stream 192.168.103.24:88
  115.  
  116. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172420]]]] [sss_child_krb5_trace_cb] (0x4000): [172420] 1652280542.388473: Sending TCP request to stream 192.168.103.24:88
  117.  
  118. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172420]]]] [sss_child_krb5_trace_cb] (0x4000): [172420] 1652280542.390608: Received answer from stream 192.168.103.24:88
  119.  
  120. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172420]]]] [sss_child_krb5_trace_cb] (0x4000): [172420] 1652280542.390656: Response was from master KDC
  121.  
  122. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172420]]]] [sss_child_krb5_trace_cb] (0x4000): [172420] 1652280542.390673: Received error from KDC: -1765328378/Client not found in Kerberos database
  123.  
  124. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172420]]]] [ldap_child_get_tgt_sync] (0x0010): Failed to init credentials: Client 'host/epmtestapp.xxx@XXX' not found in Kerberos database
  125. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172420]]]] [unique_filename_destructor] (0x2000): Unlinking [/var/lib/sss/db/ccache_XXX_Sc7KxE]
  126. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172420]]]] [main] (0x0020): ldap_child_get_tgt_sync failed.
  127. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172420]]]] [prepare_response] (0x0400): Building response for result [-1765328378]
  128. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172420]]]] [pack_buffer] (0x2000): response size: 57
  129. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172420]]]] [pack_buffer] (0x1000): result [14] krberr [-1765328378] msgsize [37] msg [Client not found in Kerberos database]
  130. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172420]]]] [main] (0x0400): ldap_child completed successfully
  131. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [main] (0x0400): ldap_child started.
  132. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [main] (0x2000): context initialized
  133. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [unpack_buffer] (0x1000): total buffer size: 74
  134. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [unpack_buffer] (0x1000): realm_str size: 17
  135. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [unpack_buffer] (0x1000): got realm_str: XXX
  136. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [unpack_buffer] (0x1000): princ_str size: 33
  137. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [unpack_buffer] (0x1000): got princ_str: host/epmtestapp.xxx
  138. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [unpack_buffer] (0x1000): keytab_name size: 0
  139. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [unpack_buffer] (0x1000): lifetime: 86400
  140. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [unpack_buffer] (0x0200): Will run as [0][0].
  141. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [privileged_krb5_setup] (0x2000): Kerberos context initialized
  142. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [main] (0x2000): Kerberos context initialized
  143. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [become_user] (0x0200): Trying to become user [0][0].
  144. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [become_user] (0x0200): Already user [0].
  145. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [main] (0x2000): Running as [0][0].
  146. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [main] (0x2000): getting TGT sync
  147. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [ldap_child_get_tgt_sync] (0x2000): got realm_name: [XXX]
  148. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [ldap_child_get_tgt_sync] (0x0100): Principal name is: [host/epmtestapp.xxx@XXX]
  149. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [ldap_child_get_tgt_sync] (0x0100): Using keytab [MEMORY:/etc/krb5.keytab]
  150. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [ldap_child_get_tgt_sync] (0x0100): Will canonicalize principals
  151. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [sss_child_krb5_trace_cb] (0x4000): [172421] 1652280542.396562: Getting initial credentials for host/epmtestapp.xxx@XXX
  152.  
  153. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [sss_child_krb5_trace_cb] (0x4000): [172421] 1652280542.396610: Looked up etypes in keytab: aes256-cts, aes128-cts
  154.  
  155. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [sss_child_krb5_trace_cb] (0x4000): [172421] 1652280542.396634: Sending request (219 bytes) to XXX
  156.  
  157. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [sss_child_krb5_trace_cb] (0x4000): [172421] 1652280542.396749: Initiating TCP connection to stream 192.168.101.160:88
  158.  
  159. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [sss_child_krb5_trace_cb] (0x4000): [172421] 1652280542.396928: Sending TCP request to stream 192.168.101.160:88
  160.  
  161. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [sss_child_krb5_trace_cb] (0x4000): [172421] 1652280542.398467: Received answer from stream 192.168.101.160:88
  162.  
  163. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [sss_child_krb5_trace_cb] (0x4000): [172421] 1652280542.398509: Response was from master KDC
  164.  
  165. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [sss_child_krb5_trace_cb] (0x4000): [172421] 1652280542.398527: Received error from KDC: -1765328359/Additional pre-authentication required
  166.  
  167. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [sss_child_krb5_trace_cb] (0x4000): [172421] 1652280542.398555: Processing preauth types: 16, 136, 19, 147, 151, 2, 133
  168.  
  169. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [sss_child_krb5_trace_cb] (0x4000): [172421] 1652280542.398567: Selected etype info: etype aes256-cts, salt "XXXhostepmtestapp.xxx", params ""
  170.  
  171. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [sss_child_krb5_trace_cb] (0x4000): [172421] 1652280542.398579: Received cookie: MIT1
  172.  
  173. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [sss_child_krb5_trace_cb] (0x4000): [172421] 1652280542.398596: Retrieving host/epmtestapp.xxx@XXX from MEMORY:/etc/krb5.keytab (vno 0, enctype aes256-cts) with result: 0/Success
  174.  
  175. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [sss_child_krb5_trace_cb] (0x4000): [172421] 1652280542.398609: AS key obtained for encrypted timestamp: aes256-cts/C287
  176.  
  177. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [sss_child_krb5_trace_cb] (0x4000): [172421] 1652280542.398647: Encrypted timestamp (for 1652280542.398620): plain 301AA011180F32303232303531313134343930325AA105020306151C, encrypted 9FD0A42F0D154A492AEB8B3C156AF91A67F2A7D42813243F3F5AD62D6FC589F6C26230A0BD563FA278734C53F66667311EB29BBBE412518D
  178.  
  179. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [sss_child_krb5_trace_cb] (0x4000): [172421] 1652280542.398660: Preauth module encrypted_timestamp (2) (flags=1) returned: 0/Success
  180.  
  181. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [sss_child_krb5_trace_cb] (0x4000): [172421] 1652280542.398670: Produced preauth for next request: 133, 2
  182.  
  183. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [sss_child_krb5_trace_cb] (0x4000): [172421] 1652280542.398689: Sending request (454 bytes) to XXX
  184.  
  185. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [sss_child_krb5_trace_cb] (0x4000): [172421] 1652280542.398718: Initiating TCP connection to stream 192.168.101.160:88
  186.  
  187. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [sss_child_krb5_trace_cb] (0x4000): [172421] 1652280542.398920: Sending TCP request to stream 192.168.101.160:88
  188.  
  189. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [sss_child_krb5_trace_cb] (0x4000): [172421] 1652280542.401493: Received answer from stream 192.168.101.160:88
  190.  
  191. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [sss_child_krb5_trace_cb] (0x4000): [172421] 1652280542.401529: Response was from master KDC
  192.  
  193. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [sss_child_krb5_trace_cb] (0x4000): [172421] 1652280542.401555: Processing preauth types: 19
  194.  
  195. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [sss_child_krb5_trace_cb] (0x4000): [172421] 1652280542.401568: Selected etype info: etype aes256-cts, salt "XXXhostepmtestapp.xxx", params ""
  196.  
  197. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [sss_child_krb5_trace_cb] (0x4000): [172421] 1652280542.401577: Produced preauth for next request: (empty)
  198.  
  199. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [sss_child_krb5_trace_cb] (0x4000): [172421] 1652280542.401589: AS key determined by preauth: aes256-cts/C287
  200.  
  201. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [sss_child_krb5_trace_cb] (0x4000): [172421] 1652280542.401628: Decrypted AS reply; session key is: aes256-cts/E979
  202.  
  203. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [sss_child_krb5_trace_cb] (0x4000): [172421] 1652280542.401644: FAST negotiation: available
  204.  
  205. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [ldap_child_get_tgt_sync] (0x2000): credentials initialized
  206. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [ldap_child_get_tgt_sync] (0x2000): keytab ccname: [FILE:/var/lib/sss/db/ccache_XXX_FJNAMI]
  207. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [sss_child_krb5_trace_cb] (0x4000): [172421] 1652280542.401705: Initializing FILE:/var/lib/sss/db/ccache_XXX_FJNAMI with default princ host/epmtestapp.xxx@XXX
  208.  
  209. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [sss_child_krb5_trace_cb] (0x4000): [172421] 1652280542.401787: Removing host/epmtestapp.xxx@XXX -> krbtgt/XXX@XXX from FILE:/var/lib/sss/db/ccache_XXX_FJNAMI
  210.  
  211. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [sss_child_krb5_trace_cb] (0x4000): [172421] 1652280542.401801: Storing host/epmtestapp.xxx@XXX -> krbtgt/XXX@XXX in FILE:/var/lib/sss/db/ccache_XXX_FJNAMI
  212.  
  213. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [ldap_child_get_tgt_sync] (0x2000): credentials stored
  214. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [ldap_child_get_tgt_sync] (0x2000): Got KDC time offset
  215. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [ldap_child_get_tgt_sync] (0x2000): Renaming [/var/lib/sss/db/ccache_XXX_FJNAMI] to [/var/lib/sss/db/ccache_XXX]
  216. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [unique_filename_destructor] (0x2000): Unlinking [/var/lib/sss/db/ccache_XXX_FJNAMI]
  217. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [unlink_dbg] (0x2000): File already removed: [/var/lib/sss/db/ccache_XXX_FJNAMI]
  218. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [prepare_response] (0x0400): Building response for result [0]
  219. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [pack_buffer] (0x2000): response size: 65
  220. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [pack_buffer] (0x1000): result [0] krberr [0] msgsize [45] msg [FILE:/var/lib/sss/db/ccache_XXX]
  221. (Wed May 11 15:49:02 2022) [[sssd[ldap_child[172421]]]] [main] (0x0400): ldap_child completed successfully
  222. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172759]]]] [main] (0x0400): ldap_child started.
  223. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172759]]]] [main] (0x2000): context initialized
  224. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172759]]]] [unpack_buffer] (0x1000): total buffer size: 74
  225. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172759]]]] [unpack_buffer] (0x1000): realm_str size: 17
  226. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172759]]]] [unpack_buffer] (0x1000): got realm_str: XXX
  227. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172759]]]] [unpack_buffer] (0x1000): princ_str size: 33
  228. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172759]]]] [unpack_buffer] (0x1000): got princ_str: host/epmtestapp.xxx
  229. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172759]]]] [unpack_buffer] (0x1000): keytab_name size: 0
  230. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172759]]]] [unpack_buffer] (0x1000): lifetime: 86400
  231. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172759]]]] [unpack_buffer] (0x0200): Will run as [0][0].
  232. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172759]]]] [privileged_krb5_setup] (0x2000): Kerberos context initialized
  233. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172759]]]] [main] (0x2000): Kerberos context initialized
  234. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172759]]]] [become_user] (0x0200): Trying to become user [0][0].
  235. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172759]]]] [become_user] (0x0200): Already user [0].
  236. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172759]]]] [main] (0x2000): Running as [0][0].
  237. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172759]]]] [main] (0x2000): getting TGT sync
  238. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172759]]]] [ldap_child_get_tgt_sync] (0x2000): got realm_name: [XXX]
  239. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172759]]]] [ldap_child_get_tgt_sync] (0x0100): Principal name is: [host/epmtestapp.xxx@XXX]
  240. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172759]]]] [ldap_child_get_tgt_sync] (0x0100): Using keytab [MEMORY:/etc/krb5.keytab]
  241. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172759]]]] [ldap_child_get_tgt_sync] (0x0100): Will canonicalize principals
  242. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172759]]]] [sss_child_krb5_trace_cb] (0x4000): [172759] 1652280627.339152: Getting initial credentials for host/epmtestapp.xxx@XXX
  243.  
  244. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172759]]]] [sss_child_krb5_trace_cb] (0x4000): [172759] 1652280627.339210: Looked up etypes in keytab: aes256-cts, aes128-cts
  245.  
  246. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172759]]]] [sss_child_krb5_trace_cb] (0x4000): [172759] 1652280627.339235: Sending request (219 bytes) to XXX
  247.  
  248. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172759]]]] [sss_child_krb5_trace_cb] (0x4000): [172759] 1652280627.339371: Initiating TCP connection to stream 192.168.100.232:88
  249.  
  250. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172759]]]] [sss_child_krb5_trace_cb] (0x4000): [172759] 1652280627.340569: Sending TCP request to stream 192.168.100.232:88
  251.  
  252. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172759]]]] [sss_child_krb5_trace_cb] (0x4000): [172759] 1652280627.342218: Received answer from stream 192.168.100.232:88
  253.  
  254. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172759]]]] [sss_child_krb5_trace_cb] (0x4000): [172759] 1652280627.342307: Response was from master KDC
  255.  
  256. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172759]]]] [sss_child_krb5_trace_cb] (0x4000): [172759] 1652280627.342334: Received error from KDC: -1765328378/Client not found in Kerberos database
  257.  
  258. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172759]]]] [ldap_child_get_tgt_sync] (0x0010): Failed to init credentials: Client 'host/epmtestapp.xxx@XXX' not found in Kerberos database
  259. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172759]]]] [unique_filename_destructor] (0x2000): Unlinking [/var/lib/sss/db/ccache_XXX_G68BuV]
  260. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172759]]]] [main] (0x0020): ldap_child_get_tgt_sync failed.
  261. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172759]]]] [prepare_response] (0x0400): Building response for result [-1765328378]
  262. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172759]]]] [pack_buffer] (0x2000): response size: 57
  263. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172759]]]] [pack_buffer] (0x1000): result [14] krberr [-1765328378] msgsize [37] msg [Client not found in Kerberos database]
  264. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172759]]]] [main] (0x0400): ldap_child completed successfully
  265. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172760]]]] [main] (0x0400): ldap_child started.
  266. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172760]]]] [main] (0x2000): context initialized
  267. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172760]]]] [unpack_buffer] (0x1000): total buffer size: 74
  268. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172760]]]] [unpack_buffer] (0x1000): realm_str size: 17
  269. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172760]]]] [unpack_buffer] (0x1000): got realm_str: XXX
  270. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172760]]]] [unpack_buffer] (0x1000): princ_str size: 33
  271. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172760]]]] [unpack_buffer] (0x1000): got princ_str: host/epmtestapp.xxx
  272. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172760]]]] [unpack_buffer] (0x1000): keytab_name size: 0
  273. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172760]]]] [unpack_buffer] (0x1000): lifetime: 86400
  274. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172760]]]] [unpack_buffer] (0x0200): Will run as [0][0].
  275. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172760]]]] [privileged_krb5_setup] (0x2000): Kerberos context initialized
  276. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172760]]]] [main] (0x2000): Kerberos context initialized
  277. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172760]]]] [become_user] (0x0200): Trying to become user [0][0].
  278. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172760]]]] [become_user] (0x0200): Already user [0].
  279. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172760]]]] [main] (0x2000): Running as [0][0].
  280. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172760]]]] [main] (0x2000): getting TGT sync
  281. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172760]]]] [ldap_child_get_tgt_sync] (0x2000): got realm_name: [XXX]
  282. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172760]]]] [ldap_child_get_tgt_sync] (0x0100): Principal name is: [host/epmtestapp.xxx@XXX]
  283. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172760]]]] [ldap_child_get_tgt_sync] (0x0100): Using keytab [MEMORY:/etc/krb5.keytab]
  284. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172760]]]] [ldap_child_get_tgt_sync] (0x0100): Will canonicalize principals
  285. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172760]]]] [sss_child_krb5_trace_cb] (0x4000): [172760] 1652280627.381164: Getting initial credentials for host/epmtestapp.xxx@XXX
  286.  
  287. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172760]]]] [sss_child_krb5_trace_cb] (0x4000): [172760] 1652280627.381223: Looked up etypes in keytab: aes256-cts, aes128-cts
  288.  
  289. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172760]]]] [sss_child_krb5_trace_cb] (0x4000): [172760] 1652280627.381247: Sending request (219 bytes) to XXX
  290.  
  291. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172760]]]] [sss_child_krb5_trace_cb] (0x4000): [172760] 1652280627.381383: Initiating TCP connection to stream 192.168.100.231:88
  292.  
  293. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172760]]]] [sss_child_krb5_trace_cb] (0x4000): [172760] 1652280627.381744: Sending TCP request to stream 192.168.100.231:88
  294.  
  295. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172760]]]] [sss_child_krb5_trace_cb] (0x4000): [172760] 1652280627.382621: Received answer from stream 192.168.100.231:88
  296.  
  297. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172760]]]] [sss_child_krb5_trace_cb] (0x4000): [172760] 1652280627.382663: Response was from master KDC
  298.  
  299. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172760]]]] [sss_child_krb5_trace_cb] (0x4000): [172760] 1652280627.382681: Received error from KDC: -1765328378/Client not found in Kerberos database
  300.  
  301. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172760]]]] [ldap_child_get_tgt_sync] (0x0010): Failed to init credentials: Client 'host/epmtestapp.xxx@XXX' not found in Kerberos database
  302. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172760]]]] [unique_filename_destructor] (0x2000): Unlinking [/var/lib/sss/db/ccache_XXX_PoVhqX]
  303. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172760]]]] [main] (0x0020): ldap_child_get_tgt_sync failed.
  304. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172760]]]] [prepare_response] (0x0400): Building response for result [-1765328378]
  305. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172760]]]] [pack_buffer] (0x2000): response size: 57
  306. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172760]]]] [pack_buffer] (0x1000): result [14] krberr [-1765328378] msgsize [37] msg [Client not found in Kerberos database]
  307. (Wed May 11 15:50:27 2022) [[sssd[ldap_child[172760]]]] [main] (0x0400): ldap_child completed successfully
  308. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172815]]]] [main] (0x0400): ldap_child started.
  309. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172815]]]] [main] (0x2000): context initialized
  310. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172815]]]] [unpack_buffer] (0x1000): total buffer size: 74
  311. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172815]]]] [unpack_buffer] (0x1000): realm_str size: 17
  312. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172815]]]] [unpack_buffer] (0x1000): got realm_str: XXX
  313. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172815]]]] [unpack_buffer] (0x1000): princ_str size: 33
  314. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172815]]]] [unpack_buffer] (0x1000): got princ_str: host/epmtestapp.xxx
  315. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172815]]]] [unpack_buffer] (0x1000): keytab_name size: 0
  316. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172815]]]] [unpack_buffer] (0x1000): lifetime: 86400
  317. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172815]]]] [unpack_buffer] (0x0200): Will run as [0][0].
  318. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172815]]]] [privileged_krb5_setup] (0x2000): Kerberos context initialized
  319. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172815]]]] [main] (0x2000): Kerberos context initialized
  320. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172815]]]] [become_user] (0x0200): Trying to become user [0][0].
  321. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172815]]]] [become_user] (0x0200): Already user [0].
  322. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172815]]]] [main] (0x2000): Running as [0][0].
  323. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172815]]]] [main] (0x2000): getting TGT sync
  324. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172815]]]] [ldap_child_get_tgt_sync] (0x2000): got realm_name: [XXX]
  325. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172815]]]] [ldap_child_get_tgt_sync] (0x0100): Principal name is: [host/epmtestapp.xxx@XXX]
  326. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172815]]]] [ldap_child_get_tgt_sync] (0x0100): Using keytab [MEMORY:/etc/krb5.keytab]
  327. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172815]]]] [ldap_child_get_tgt_sync] (0x0100): Will canonicalize principals
  328. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172815]]]] [sss_child_krb5_trace_cb] (0x4000): [172815] 1652280633.398058: Getting initial credentials for host/epmtestapp.xxx@XXX
  329.  
  330. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172815]]]] [sss_child_krb5_trace_cb] (0x4000): [172815] 1652280633.398115: Looked up etypes in keytab: aes256-cts, aes128-cts
  331.  
  332. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172815]]]] [sss_child_krb5_trace_cb] (0x4000): [172815] 1652280633.398153: Sending request (219 bytes) to XXX
  333.  
  334. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172815]]]] [sss_child_krb5_trace_cb] (0x4000): [172815] 1652280633.398280: Initiating TCP connection to stream 192.168.103.24:88
  335.  
  336. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172815]]]] [sss_child_krb5_trace_cb] (0x4000): [172815] 1652280633.398951: Sending TCP request to stream 192.168.103.24:88
  337.  
  338. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172815]]]] [sss_child_krb5_trace_cb] (0x4000): [172815] 1652280633.401320: Received answer from stream 192.168.103.24:88
  339.  
  340. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172815]]]] [sss_child_krb5_trace_cb] (0x4000): [172815] 1652280633.401364: Response was from master KDC
  341.  
  342. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172815]]]] [sss_child_krb5_trace_cb] (0x4000): [172815] 1652280633.401380: Received error from KDC: -1765328378/Client not found in Kerberos database
  343.  
  344. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172815]]]] [ldap_child_get_tgt_sync] (0x0010): Failed to init credentials: Client 'host/epmtestapp.xxx@XXX' not found in Kerberos database
  345. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172815]]]] [unique_filename_destructor] (0x2000): Unlinking [/var/lib/sss/db/ccache_XXX_uCkKlf]
  346. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172815]]]] [main] (0x0020): ldap_child_get_tgt_sync failed.
  347. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172815]]]] [prepare_response] (0x0400): Building response for result [-1765328378]
  348. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172815]]]] [pack_buffer] (0x2000): response size: 57
  349. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172815]]]] [pack_buffer] (0x1000): result [14] krberr [-1765328378] msgsize [37] msg [Client not found in Kerberos database]
  350. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172815]]]] [main] (0x0400): ldap_child completed successfully
  351. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172816]]]] [main] (0x0400): ldap_child started.
  352. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172816]]]] [main] (0x2000): context initialized
  353. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172816]]]] [unpack_buffer] (0x1000): total buffer size: 74
  354. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172816]]]] [unpack_buffer] (0x1000): realm_str size: 17
  355. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172816]]]] [unpack_buffer] (0x1000): got realm_str: XXX
  356. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172816]]]] [unpack_buffer] (0x1000): princ_str size: 33
  357. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172816]]]] [unpack_buffer] (0x1000): got princ_str: host/epmtestapp.xxx
  358. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172816]]]] [unpack_buffer] (0x1000): keytab_name size: 0
  359. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172816]]]] [unpack_buffer] (0x1000): lifetime: 86400
  360. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172816]]]] [unpack_buffer] (0x0200): Will run as [0][0].
  361. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172816]]]] [privileged_krb5_setup] (0x2000): Kerberos context initialized
  362. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172816]]]] [main] (0x2000): Kerberos context initialized
  363. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172816]]]] [become_user] (0x0200): Trying to become user [0][0].
  364. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172816]]]] [become_user] (0x0200): Already user [0].
  365. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172816]]]] [main] (0x2000): Running as [0][0].
  366. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172816]]]] [main] (0x2000): getting TGT sync
  367. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172816]]]] [ldap_child_get_tgt_sync] (0x2000): got realm_name: [XXX]
  368. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172816]]]] [ldap_child_get_tgt_sync] (0x0100): Principal name is: [host/epmtestapp.xxx@XXX]
  369. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172816]]]] [ldap_child_get_tgt_sync] (0x0100): Using keytab [MEMORY:/etc/krb5.keytab]
  370. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172816]]]] [ldap_child_get_tgt_sync] (0x0100): Will canonicalize principals
  371. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172816]]]] [sss_child_krb5_trace_cb] (0x4000): [172816] 1652280633.408251: Getting initial credentials for host/epmtestapp.xxx@XXX
  372.  
  373. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172816]]]] [sss_child_krb5_trace_cb] (0x4000): [172816] 1652280633.408309: Looked up etypes in keytab: aes256-cts, aes128-cts
  374.  
  375. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172816]]]] [sss_child_krb5_trace_cb] (0x4000): [172816] 1652280633.408334: Sending request (219 bytes) to XXX
  376.  
  377. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172816]]]] [sss_child_krb5_trace_cb] (0x4000): [172816] 1652280633.408460: Initiating TCP connection to stream 192.168.100.232:88
  378.  
  379. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172816]]]] [sss_child_krb5_trace_cb] (0x4000): [172816] 1652280633.408947: Sending TCP request to stream 192.168.100.232:88
  380.  
  381. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172816]]]] [sss_child_krb5_trace_cb] (0x4000): [172816] 1652280633.409997: Received answer from stream 192.168.100.232:88
  382.  
  383. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172816]]]] [sss_child_krb5_trace_cb] (0x4000): [172816] 1652280633.410041: Response was from master KDC
  384.  
  385. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172816]]]] [sss_child_krb5_trace_cb] (0x4000): [172816] 1652280633.410058: Received error from KDC: -1765328378/Client not found in Kerberos database
  386.  
  387. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172816]]]] [ldap_child_get_tgt_sync] (0x0010): Failed to init credentials: Client 'host/epmtestapp.xxx@XXX' not found in Kerberos database
  388. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172816]]]] [unique_filename_destructor] (0x2000): Unlinking [/var/lib/sss/db/ccache_XXX_lfPfWe]
  389. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172816]]]] [main] (0x0020): ldap_child_get_tgt_sync failed.
  390. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172816]]]] [prepare_response] (0x0400): Building response for result [-1765328378]
  391. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172816]]]] [pack_buffer] (0x2000): response size: 57
  392. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172816]]]] [pack_buffer] (0x1000): result [14] krberr [-1765328378] msgsize [37] msg [Client not found in Kerberos database]
  393. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172816]]]] [main] (0x0400): ldap_child completed successfully
  394. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [main] (0x0400): ldap_child started.
  395. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [main] (0x2000): context initialized
  396. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [unpack_buffer] (0x1000): total buffer size: 74
  397. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [unpack_buffer] (0x1000): realm_str size: 17
  398. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [unpack_buffer] (0x1000): got realm_str: XXX
  399. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [unpack_buffer] (0x1000): princ_str size: 33
  400. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [unpack_buffer] (0x1000): got princ_str: host/epmtestapp.xxx
  401. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [unpack_buffer] (0x1000): keytab_name size: 0
  402. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [unpack_buffer] (0x1000): lifetime: 86400
  403. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [unpack_buffer] (0x0200): Will run as [0][0].
  404. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [privileged_krb5_setup] (0x2000): Kerberos context initialized
  405. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [main] (0x2000): Kerberos context initialized
  406. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [become_user] (0x0200): Trying to become user [0][0].
  407. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [become_user] (0x0200): Already user [0].
  408. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [main] (0x2000): Running as [0][0].
  409. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [main] (0x2000): getting TGT sync
  410. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [ldap_child_get_tgt_sync] (0x2000): got realm_name: [XXX]
  411. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [ldap_child_get_tgt_sync] (0x0100): Principal name is: [host/epmtestapp.xxx@XXX]
  412. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [ldap_child_get_tgt_sync] (0x0100): Using keytab [MEMORY:/etc/krb5.keytab]
  413. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [ldap_child_get_tgt_sync] (0x0100): Will canonicalize principals
  414. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [sss_child_krb5_trace_cb] (0x4000): [172817] 1652280633.416270: Getting initial credentials for host/epmtestapp.xxx@XXX
  415.  
  416. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [sss_child_krb5_trace_cb] (0x4000): [172817] 1652280633.416317: Looked up etypes in keytab: aes256-cts, aes128-cts
  417.  
  418. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [sss_child_krb5_trace_cb] (0x4000): [172817] 1652280633.416341: Sending request (219 bytes) to XXX
  419.  
  420. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [sss_child_krb5_trace_cb] (0x4000): [172817] 1652280633.416457: Initiating TCP connection to stream 192.168.101.160:88
  421.  
  422. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [sss_child_krb5_trace_cb] (0x4000): [172817] 1652280633.416631: Sending TCP request to stream 192.168.101.160:88
  423.  
  424. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [sss_child_krb5_trace_cb] (0x4000): [172817] 1652280633.418252: Received answer from stream 192.168.101.160:88
  425.  
  426. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [sss_child_krb5_trace_cb] (0x4000): [172817] 1652280633.418294: Response was from master KDC
  427.  
  428. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [sss_child_krb5_trace_cb] (0x4000): [172817] 1652280633.418313: Received error from KDC: -1765328359/Additional pre-authentication required
  429.  
  430. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [sss_child_krb5_trace_cb] (0x4000): [172817] 1652280633.418345: Processing preauth types: 16, 136, 19, 147, 151, 2, 133
  431.  
  432. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [sss_child_krb5_trace_cb] (0x4000): [172817] 1652280633.418361: Selected etype info: etype aes256-cts, salt "XXXhostepmtestapp.xxx", params ""
  433.  
  434. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [sss_child_krb5_trace_cb] (0x4000): [172817] 1652280633.418370: Received cookie: MIT1
  435.  
  436. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [sss_child_krb5_trace_cb] (0x4000): [172817] 1652280633.418387: Retrieving host/epmtestapp.xxx@XXX from MEMORY:/etc/krb5.keytab (vno 0, enctype aes256-cts) with result: 0/Success
  437.  
  438. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [sss_child_krb5_trace_cb] (0x4000): [172817] 1652280633.418403: AS key obtained for encrypted timestamp: aes256-cts/C287
  439.  
  440. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [sss_child_krb5_trace_cb] (0x4000): [172817] 1652280633.418438: Encrypted timestamp (for 1652280633.418410): plain 301AA011180F32303232303531313134353033335AA105020306626A, encrypted 4D03456EFB509420DA6C0B446BB7A2E4D478D7887E286A949255F44A73B137C8A656AAA6131DCBFC2092D00AC025492D0089360526257387
  441.  
  442. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [sss_child_krb5_trace_cb] (0x4000): [172817] 1652280633.418453: Preauth module encrypted_timestamp (2) (flags=1) returned: 0/Success
  443.  
  444. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [sss_child_krb5_trace_cb] (0x4000): [172817] 1652280633.418463: Produced preauth for next request: 133, 2
  445.  
  446. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [sss_child_krb5_trace_cb] (0x4000): [172817] 1652280633.418479: Sending request (454 bytes) to XXX
  447.  
  448. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [sss_child_krb5_trace_cb] (0x4000): [172817] 1652280633.418509: Initiating TCP connection to stream 192.168.101.160:88
  449.  
  450. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [sss_child_krb5_trace_cb] (0x4000): [172817] 1652280633.418653: Sending TCP request to stream 192.168.101.160:88
  451.  
  452. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [sss_child_krb5_trace_cb] (0x4000): [172817] 1652280633.420938: Received answer from stream 192.168.101.160:88
  453.  
  454. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [sss_child_krb5_trace_cb] (0x4000): [172817] 1652280633.420983: Response was from master KDC
  455.  
  456. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [sss_child_krb5_trace_cb] (0x4000): [172817] 1652280633.421010: Processing preauth types: 19
  457.  
  458. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [sss_child_krb5_trace_cb] (0x4000): [172817] 1652280633.421021: Selected etype info: etype aes256-cts, salt "XXXhostepmtestapp.xxx", params ""
  459.  
  460. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [sss_child_krb5_trace_cb] (0x4000): [172817] 1652280633.421033: Produced preauth for next request: (empty)
  461.  
  462. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [sss_child_krb5_trace_cb] (0x4000): [172817] 1652280633.421043: AS key determined by preauth: aes256-cts/C287
  463.  
  464. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [sss_child_krb5_trace_cb] (0x4000): [172817] 1652280633.421078: Decrypted AS reply; session key is: aes256-cts/905E
  465.  
  466. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [sss_child_krb5_trace_cb] (0x4000): [172817] 1652280633.421095: FAST negotiation: available
  467.  
  468. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [ldap_child_get_tgt_sync] (0x2000): credentials initialized
  469. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [ldap_child_get_tgt_sync] (0x2000): keytab ccname: [FILE:/var/lib/sss/db/ccache_XXX_4fB6pe]
  470. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [sss_child_krb5_trace_cb] (0x4000): [172817] 1652280633.421170: Initializing FILE:/var/lib/sss/db/ccache_XXX_4fB6pe with default princ host/epmtestapp.xxx@XXX
  471.  
  472. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [sss_child_krb5_trace_cb] (0x4000): [172817] 1652280633.421262: Removing host/epmtestapp.xxx@XXX -> krbtgt/XXX@XXX from FILE:/var/lib/sss/db/ccache_XXX_4fB6pe
  473.  
  474. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [sss_child_krb5_trace_cb] (0x4000): [172817] 1652280633.421275: Storing host/epmtestapp.xxx@XXX -> krbtgt/XXX@XXX in FILE:/var/lib/sss/db/ccache_XXX_4fB6pe
  475.  
  476. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [ldap_child_get_tgt_sync] (0x2000): credentials stored
  477. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [ldap_child_get_tgt_sync] (0x2000): Got KDC time offset
  478. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [ldap_child_get_tgt_sync] (0x2000): Renaming [/var/lib/sss/db/ccache_XXX_4fB6pe] to [/var/lib/sss/db/ccache_XXX]
  479. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [unique_filename_destructor] (0x2000): Unlinking [/var/lib/sss/db/ccache_XXX_4fB6pe]
  480. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [unlink_dbg] (0x2000): File already removed: [/var/lib/sss/db/ccache_XXX_4fB6pe]
  481. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [prepare_response] (0x0400): Building response for result [0]
  482. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [pack_buffer] (0x2000): response size: 65
  483. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [pack_buffer] (0x1000): result [0] krberr [0] msgsize [45] msg [FILE:/var/lib/sss/db/ccache_XXX]
  484. (Wed May 11 15:50:33 2022) [[sssd[ldap_child[172817]]]] [main] (0x0400): ldap_child completed successfully
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement