Didn't see the original thread... but guessing as to the issue;

IPA w. ipaclient uses aes256-cts-sha-96 with random salt to encrypt session
keys and principals keytabs.

Things that generate a keytab using ktutil for example will fail, it does
not take the random salt string as part of the 'addent' call so this
creates issues.

 If IPAclient is in use then the ipa-getkeytab must be used.



On Tue, Jan 16, 2018 at 9:20 AM, Greg Hudson <ghud...@mit.edu> wrote:

> On 01/10/2018 11:03 AM, lejeczek wrote:> krb5kdc[606061](info): preauth
> (encrypted_timestamp) verify
> > failure: Preauthentication failed
>
> One would normally see this error if the wrong key or password was used
> to authenticate.  So there might be a mismatch between the keytab file
> on the initiating host and the KDC.  As I am not familiar with FreeIPA
> (only Kerberos), I don't know how that might have come about.
> ________________________________________________
> Kerberos mailing list           Kerberos@mit.edu
> https://mailman.mit.edu/mailman/listinfo/kerberos
>



-- 
Todd Grayson
Business Operations Manager
Customer Operations Engineering
Security SME
________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to