Rocksolid Light

Welcome to novaBBS (click a section below)

mail  files  register  newsreader  groups  login

Message-ID:  

Equal bytes for women.


devel / comp.protocols.kerberos / GSS-API error gss_accept_sec_context: Request ticket server HTTP/ not found in keytab

SubjectAuthor
o GSS-API error gss_accept_sec_context: Request ticket server HTTP/ notKerberos Enthusiast

1
GSS-API error gss_accept_sec_context: Request ticket server HTTP/ not found in keytab

<mailman.122.1668186642.8148.kerberos@mit.edu>

  copy mid

https://www.novabbs.com/devel/article-flat.php?id=323&group=comp.protocols.kerberos#323

  copy link   Newsgroups: comp.protocols.kerberos
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!tncsrv06.tnetconsulting.net!.POSTED.mailman.mit.edu!not-for-mail
From: kerberos...@gmail.com (Kerberos Enthusiast)
Newsgroups: comp.protocols.kerberos
Subject: GSS-API error gss_accept_sec_context: Request ticket server HTTP/ not
found in keytab
Date: Fri, 11 Nov 2022 19:20:27 +0530
Organization: TNet Consulting
Lines: 23
Message-ID: <mailman.122.1668186642.8148.kerberos@mit.edu>
References: <CAGshih-EXCKjUbs0EGjOUL9fn5ZrAnqWP5wvgX=-xVPUTTKr5Q@mail.gmail.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Injection-Info: tncsrv06.tnetconsulting.net; posting-host="mailman.mit.edu:18.7.21.50";
logging-data="16557"; mail-complaints-to="newsmaster@tnetconsulting.net"
To: kerberos@mit.edu
Authentication-Results: mit.edu;
dmarc=pass (p=none dis=none) header.from=gmail.com
Authentication-Results: mit.edu; arc=pass smtp.remote-ip=18.7.73.16
ARC-Seal: i=2; a=rsa-sha256; d=mit.edu; s=arc; t=1668174643; cv=pass;
b=ecoKq90gfvizp4D5j9s98yx8WQCvC/Ayt0B1sN9s7vWpfHiyM5E1adS+juZaDkyU1gX7BV16BDlJNz/Gf9xaNJQaYPZzwaCwMJTFkS2MkpDK7ozhStTU6bSDP+HDvA2GXXEdsOiTuDrDpw7DnpEBnfRTic099ZQH6oz9gHccNQWWBKj2nMoqckj26M6B2zj5DLfJIbLtip0Gj40Ooaef2cwhsjmuWQRgQMNzyUpGq7pzKBakUsKip8OVWf+v4kDH2W3r+e7bVIG5QMUHLPIleg5F2QifhV/BJ67GuC+/7No4aMV2FmMbuYfpbg/n2yHFrRdjOnw1CMGS5diiJWipog==
ARC-Message-Signature: i=2; a=rsa-sha256; d=mit.edu; s=arc; t=1668174643;
c=relaxed/relaxed; bh=sp9F652bAD+qVgLq5/k6B43kCQSWQbccSWdzrqs2nk8=;
h=DKIM-Signature:DKIM-Signature:MIME-Version:From:Date:Message-ID:
Subject:To;
b=uAyM5hS023Bqqp3V9sxFPP0JvFEqPO1mKgqPGragqcAh4qkOgEDX5c+BXCdg8GzLEayqA4V7INWjFzTRuMbtjBMvTX0N2M0/jmAQ8i3vRrG11bZHy9/DDO7KOtG4aujUFYqf0tl0vYLctPeJvEYeDjhYxnHvzcuwgvG4MlVRacncFRzFD+wEC3JhwvaWBq9GbRmVFm+Q2UITtRIc7LmIsPew0yeaVNHq9raS5c1qVjszNZXlarLJDylsaPXCdzoC/cupkfXGRImuwwKQRhTL6yHl8okzmBmrcpXP8DhvopC8Ec7FwXB1SzHYKw/9as8Z2z6jf9bR1Rm5X5VE+eNT5g==
ARC-Authentication-Results: i=2; mit.edu; dkim=pass (1024-bit key)
header.d=mitprod.onmicrosoft.com header.i=@mitprod.onmicrosoft.com
header.b=ZoDJ3y5I;
dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com
header.b=IgNPv8Kl
Authentication-Results: mit.edu;
dkim=pass (1024-bit key) header.d=mitprod.onmicrosoft.com
header.i=@mitprod.onmicrosoft.com header.b=ZoDJ3y5I;
dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com
header.b=IgNPv8Kl
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
b=RO6aQRRUjUe1ARtdQZAeXGDcISDBAWxBgaIbv2EeEm26xrNSYALH8GtgrJVnaS2QmJ8onyxMzycw/NpDTwkphQpqDBJ4kze2+nlyhTN7X7VWhwGYtvUd6RnOxFPWKFUzOaPhVAwsy8iJ3EjXI1Dc4C2QSU9TBtHbO6km3Ltq4F4Ft/h7lUpj62Wu/00DbXmGJSNiVWgrFwIUkdJCJCwmJbEnVgo1kA1GCZ+dK7f6EBpaIWpm9+aKO2L4i24UkCvyYTOSOB76YEXB41jFYaXoPFie2QAfyWf1rCLDiX/bWIyQLH2kihqfHC8y5gNTfBYOG6w57r72vwHAx/MIJsS8ew==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
s=arcselector9901;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
bh=sp9F652bAD+qVgLq5/k6B43kCQSWQbccSWdzrqs2nk8=;
b=GAMCIPc351X++IsICWlGMD5xB85EsseQSqdPH4UF9aRscRQQ4limGdYiDKkleBD+V7SPjErsxYmNnGe0tKfRErwytyCBmoYwky+JwyVjpwODP0aK/gPA3bCUE1mZUGLRS10i58j43lD3NKuHkfFpjicwefF7ji9/vkTrDu7ZMPEdrOW02/IaQK4rhP7iMTfGrtuUa+S+VI2+brjg5F/5H1fm8DEc1DOoWj/2F953XyLHoDOxzq9NfTjIu5xW6atsYcOj0Vunc8yFRaxQqbAC1044uOkU2HPI1snnxyb8kOryzJUmZ1YRPSPEe0VGTDU2Rjm3bvri81QVbBQcdNmybw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
209.85.160.54) smtp.rcpttodomain=mit.edu smtp.mailfrom=gmail.com; dmarc=pass
(p=none sp=quarantine pct=100) action=none header.from=gmail.com; dkim=pass
(signature was verified) header.d=gmail.com; arc=none (0)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=mitprod.onmicrosoft.com; s=selector2-mitprod-onmicrosoft-com;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
bh=sp9F652bAD+qVgLq5/k6B43kCQSWQbccSWdzrqs2nk8=;
b=ZoDJ3y5I0PX6aPJo4mHMZRtkN7QiL2n/oBjg5A/8HW4Gg2KKhYdZUSuBoD+RMufvgTyiN3Tz+YN3kBCg0h3t7yt0oxWh0nV4CGncAsA72mVhui6SzaWVwhaNkknZYhUzvCe6PiF8Hjrwu6FIoYdYVHJLP8lNI0Koyeev+IGvMsk=
Authentication-Results: spf=pass (sender IP is 209.85.160.54)
smtp.mailfrom=gmail.com; dkim=pass (signature was verified)
header.d=gmail.com;dmarc=pass action=none header.from=gmail.com;
Received-SPF: Pass (protection.outlook.com: domain of gmail.com designates
209.85.160.54 as permitted sender) receiver=protection.outlook.com;
client-ip=209.85.160.54; helo=mail-oa1-f54.google.com; pr=C
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112;
h=to:subject:message-id:date:from:mime-version:from:to:cc:subject
:date:message-id:reply-to;
bh=sp9F652bAD+qVgLq5/k6B43kCQSWQbccSWdzrqs2nk8=;
b=IgNPv8Klu49ZQ/gU/+yW0bVGRPp6BaPInVCuo6Eq3dYLhjtPFfKDu0kzD/iA/N1e+3
TUcMPPDyEFOnYVKE/GSgVzSSye+1zpXWMjE4UeG6VM/y37oZHX8U2iQ6k4yOgz3WrIAc
Vrgjs7jzqnIrXGUscpUd8AzQP+hGdFu3JnUz6xdavbHcwojRQt+nMGvf3t2poZQ30TXo
sO3+mLeG7v4Dm21Jznjrd342kBsDNgrIJtFxWA68qTT+W0crAtBwRVgj9d4q/GAJhN94
9g1Tn+YB2rnY4g1uyGc90wCjHeF0P/jjM0gXwBpDAXA8SQFndIiaI7oNt5YrUSPaGcET
V7aA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=1e100.net; s=20210112;
h=to:subject:message-id:date:from:mime-version:x-gm-message-state
:from:to:cc:subject:date:message-id:reply-to;
bh=sp9F652bAD+qVgLq5/k6B43kCQSWQbccSWdzrqs2nk8=;
b=bD79cuICXRysuS/HGYcGYIhrnhKzKTXvlJ6ImRF09w813F3B6OybMklto5lODnQ668
83vvAttst2XSlCh/WV8zNQNCOhsSGI99hUiSOylAc1WnGfwZi0gnIyKcGPOY8Wf0Lj8P
tmgmQBmN4g4fa5tEH5VsfmZSVE1IR6ZxDnYysdSD3EAnBOt4S0PkY1JzDVuIyY/wqxtZ
D0j1IZwesPmFEmkokoYjjKJpB4PFkjvywnTIamCvXR711wErSpgNTdGlt+OkEma3NJ2i
LoNSIi6TKE/OieexhztFVDHdB6AY8qHxWLI8xjPAbVcaj5G+AFDQ+20EVRi71rIj9YCN
LjNA==
X-Gm-Message-State: ANoB5pm6yyCsdWFppR6KWxb+v+23UklBG9vszkt/pHVvWFpwqQoXj9l5
7LrsCUh0g7e2/RHkSuNCb4CdTsZL42CUtXdb9aZezCPiz8mipeqc+g8=
X-Google-Smtp-Source: AA0mqf5grmtbA+Hxz4TXZWWV4Wv09bFdwzTQyZ/lhbswp+0E96E4fhlfvrYyz0N0RggeGsx0TebapFSUqXC/jPm4rXg=
X-Received: by 2002:a05:6870:6592:b0:13b:e41d:290b with SMTP id
fp18-20020a056870659200b0013be41d290bmr958495oab.64.1668174638857; Fri, 11
Nov 2022 05:50:38 -0800 (PST)
X-EOPAttributedMessage: 0
X-EOPTenantAttributedMessage: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b:0
X-MS-PublicTrafficType: Email
X-MS-TrafficTypeDiagnostic: BL02EPF0000C405:EE_|MWHPR01MB2414:EE_
X-MS-Office365-Filtering-Correlation-Id: 703abf97-9111-4849-1e35-08dac3ebb7f5
X-LD-Processed: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b,ExtAddr
X-MS-Exchange-AtpMessageProperties: SA
X-MS-Exchange-SenderADCheck: 0
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:209.85.160.54; CTRY:US; LANG:en; SCL:1; SRV:;
IPV:NLI; SFV:NSPM; H:mail-oa1-f54.google.com; PTR:mail-oa1-f54.google.com;
CAT:NONE;
SFS:(13230022)(4636009)(376002)(346002)(396003)(39860400002)(136003)(84050400002)(451199015)(83380400001)(86362001)(55446002)(7596003)(356005)(7636003)(5660300002)(2906002)(8676002)(44832011)(70586007)(34206002)(68406010)(33964004)(26005)(6666004)(73392003)(336012)(82202003)(76482006)(316002)(42186006)(786003)(498600001);
DIR:OUT; SFP:1102;
X-Auto-Response-Suppress: DR, OOF, AutoReply
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Nov 2022 13:50:39.7215 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 703abf97-9111-4849-1e35-08dac3ebb7f5
X-MS-Exchange-CrossTenant-Id: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b
X-MS-Exchange-CrossTenant-AuthSource: BL02EPF0000C405.namprd05.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: Internet
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR01MB2414
X-OriginatorOrg: mitprod.onmicrosoft.com
X-Mailman-Approved-At: Fri, 11 Nov 2022 12:10:41 -0500
X-Content-Filtered-By: Mailman/MimeDel 2.1.34
X-BeenThere: kerberos@mit.edu
X-Mailman-Version: 2.1.34
Precedence: list
List-Id: The Kerberos Authentication System Mailing List <kerberos.mit.edu>
List-Unsubscribe: <https://mailman.mit.edu/mailman/options/kerberos>,
<mailto:kerberos-request@mit.edu?subject=unsubscribe>
List-Archive: <http://mailman.mit.edu/pipermail/kerberos/>
List-Post: <mailto:kerberos@mit.edu>
List-Help: <mailto:kerberos-request@mit.edu?subject=help>
List-Subscribe: <https://mailman.mit.edu/mailman/listinfo/kerberos>,
<mailto:kerberos-request@mit.edu?subject=subscribe>
X-Mailman-Original-Message-ID: <CAGshih-EXCKjUbs0EGjOUL9fn5ZrAnqWP5wvgX=-xVPUTTKr5Q@mail.gmail.com>
 by: Kerberos Enthusiast - Fri, 11 Nov 2022 13:50 UTC

Hello Kerberos,

I am trying to make a windows client authenticate with an authentication
server(using AD machine for KDC) to access multiple services.
There is a multiple keytab file per authentication server.

But I'm facing this error below, while this does not occur every time, it
occurred when sending multiple authentication requests (around 200
requests) for the same service from different client machines while users
are already domain users.

*GSS-API error gss_accept_sec_context: Request ticket server HTTP/ not
found in keytab*
Probability of this issue occurring is around 20% only.

Using GSS-API to acquire cred : gss_acquire_cred().
For loading keytab file : krb5_gss_register_acceptor_idennntity().

How can we resolve this?
Can we use any other GSS-API in place of this?

Thanks,

1
server_pubkey.txt

rocksolid light 0.9.8
clearnet tor