Hi all. I just found out that the issue was caused by some race conditions when I experiment with master-master deployment. Please ignore this thread. Cheers, Yegui
On Fri, Feb 1, 2019 at 11:20 AM Yegui Cai <caiye...@gmail.com> wrote: > Hi all. > > I run KDC 1.15.1. At the host, I use kadmin.local to add a principle. Very > strange that my first attempt failed silently while the second attempt > succeeded. Here are the steps: > > [root@gamma-hactive ~]# kadmin.local > Authenticating as principal hdfs/ad...@example.com with password. > kadmin.local: addprinc yegui > WARNING: no policy specified for ye...@example.com; defaulting to no > policy > Enter password for principal "ye...@example.com": > Re-enter password for principal "ye...@example.com": > Principal "ye...@example.com" created. > kadmin.local: getprinc yegui > get_principal: Principal does not exist while retrieving " > ye...@example.com". > kadmin.local: addprinc yegui > WARNING: no policy specified for ye...@example.com; defaulting to no > policy > Enter password for principal "ye...@example.com": > Re-enter password for principal "ye...@example.com": > Principal "ye...@example.com" created. > kadmin.local: getprinc yegui > Principal: ye...@example.com > Expiration date: [never] > Last password change: Fri Feb 01 16:00:09 UTC 2019 > Password expiration date: [never] > Maximum ticket life: 1 day 00:00:00 > Maximum renewable life: 7 days 00:00:00 > Last modified: Fri Feb 01 16:00:09 UTC 2019 (hdfs/ad...@example.com) > Last successful authentication: [never] > Last failed authentication: [never] > Failed password attempts: 0 > Number of keys: 4 > Key: vno 1, aes256-cts-hmac-sha1-96 > Key: vno 1, aes128-cts-hmac-sha1-96 > Key: vno 1, des3-cbc-sha1 > Key: vno 1, arcfour-hmac > MKey: vno 1 > Attributes: REQUIRES_PRE_AUTH > Policy: [none] > > Any idea? Thanks! > Yegui > ________________________________________________ Kerberos mailing list Kerberos@mit.edu https://mailman.mit.edu/mailman/listinfo/kerberos