Hi all.
I just found out that the issue was caused by some race conditions when I
experiment with master-master deployment. Please ignore this thread.
Cheers,
Yegui

On Fri, Feb 1, 2019 at 11:20 AM Yegui Cai <caiye...@gmail.com> wrote:

> Hi all.
>
> I run KDC 1.15.1. At the host, I use kadmin.local to add a principle. Very
> strange that my first attempt failed silently while the second attempt
> succeeded. Here are the steps:
>
> [root@gamma-hactive ~]# kadmin.local
> Authenticating as principal hdfs/ad...@example.com with password.
> kadmin.local:  addprinc yegui
> WARNING: no policy specified for ye...@example.com; defaulting to no
> policy
> Enter password for principal "ye...@example.com":
> Re-enter password for principal "ye...@example.com":
> Principal "ye...@example.com" created.
> kadmin.local:  getprinc yegui
> get_principal: Principal does not exist while retrieving "
> ye...@example.com".
> kadmin.local:  addprinc yegui
> WARNING: no policy specified for ye...@example.com; defaulting to no
> policy
> Enter password for principal "ye...@example.com":
> Re-enter password for principal "ye...@example.com":
> Principal "ye...@example.com" created.
> kadmin.local:  getprinc yegui
> Principal: ye...@example.com
> Expiration date: [never]
> Last password change: Fri Feb 01 16:00:09 UTC 2019
> Password expiration date: [never]
> Maximum ticket life: 1 day 00:00:00
> Maximum renewable life: 7 days 00:00:00
> Last modified: Fri Feb 01 16:00:09 UTC 2019 (hdfs/ad...@example.com)
> Last successful authentication: [never]
> Last failed authentication: [never]
> Failed password attempts: 0
> Number of keys: 4
> Key: vno 1, aes256-cts-hmac-sha1-96
> Key: vno 1, aes128-cts-hmac-sha1-96
> Key: vno 1, des3-cbc-sha1
> Key: vno 1, arcfour-hmac
> MKey: vno 1
> Attributes: REQUIRES_PRE_AUTH
> Policy: [none]
>
> Any idea? Thanks!
> Yegui
>
________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to