Greg,
Sorry my mistake
I meant the following krb5.conf
kdc=server1kdc=server2kdc=server3master_kdc=server1master_kdc=server2master_kdc=server3
the above DOES NOT WORK when server1 and server2 are down.But If I comment 
master_kdc=server2 I'm able to kinit. Like so:
kdc=server1kdc=server2kdc=server3master_kdc=server1#master_kdc=server2master_kdc=server3
It seems like kerberos is ok with encountering one failed master_kdc but not 
two or more.
This is what KRB_TRACE shows with 'bad' configuration. Server3 is never even 
tried.
kinit tries server1 and server2 but never even attempts 
server3KRB5_TRACE=/dev/stdout kinit user(a)test.domain [12536] 
1501112935.251721: Getting initial credentials for user(a)test.domain [12536] 
1501112935.251917: Sending request (181 bytes) to test.domain[12536] 
1501112935.251956: Resolving hostname server1[12536] 1501112935.252875: Sending 
initial UDP request to dgram server1_ip:88[12536] 1501112936.253962: Resolving 
hostname server2[12536] 1501112936.255680: Retrying AS request with master 
KDC[12536] 1501112936.255699: Getting initial credentials for 
user(a)test.domain[12536] 1501112936.255763: Sending request (181 bytes) to 
test.domain (master)[12536] 1501112936.255779: Resolving hostname 
server1[12536] 1501112936.256379: Sending initial UDP request to dgram 
server1_ip:88[12536] 1501112937.257451: Resolving hostname server2kinit: 
Invalid argument while getting initial credentials

      From: Greg Hudson <ghud...@mit.edu>
 To: pgb205 <pgb...@yahoo.com>; "kerberos@mit.edu" <kerberos@mit.edu> 
 Sent: Monday, August 7, 2017 4:52 PM
 Subject: Re: More than 2 failed master_kdc servers cause errors
   
On 08/07/2017 04:31 PM, pgb205 wrote:
> krb5.conf looks like
> kdc=server1
> kdc=server2
> kdc=server2
> master_kdc=server1
> master_kdc=server2
> master_kdc=server3
> server1 and server2 are down. server3 is up and running
> Attempting to auth with kinit user_id and above configuration will fail.

(Did you mean to list "kdc=server2" twice?)

master_kdc is only intended to operate as a fallback for when a client
contacts a KDC which contains out-of-date keys due to propagation delay.
 If the client tries to contact all of the KDCs listed in values of
"kdc" and can't contact any of them, it does not fall back to trying
KDCs listed in master_kdc.

Also, the master_kdc fallback only applies to initial authentication,
not to TGS requests, although that should probably change.

> However commenting master_kdc=server1 and master_kdc=server2 lines will allow 
> authentication
> kdc=server1
> kdc=server2
> kdc=server2
> #master_kdc=server1
> #master_kdc=server2
> master_kdc=server3

I would not expect that to work when server1 and server2 are
inaccessible, and it doesn't work when I try it in a simple test
environment.


   
________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to