A reproducer for this got codified as of 1:9.9p1-2 (thanks to Colin
Watson). It's therefore included in Plucky and can be easily reproduced
on Oracular.

To reproduce, we can use the attached "dep8-verifier.diff" to add
corresponding autopkgtest improvements to Oracular, which is then
showing the very same "sign_and_send_pubkey: internal error: initial
hostkey not recorded" error on login:


$ autopkgtest -U -B . --test-name=ssh-gssapi -- lxd 
autopkgtest/ubuntu/oracular/amd64
autopkgtest [11:37:29]: starting date and time: 2024-12-16 11:37:29+0100
autopkgtest [11:37:29]: version 5.38ubuntu1~24.04.1
autopkgtest [11:37:29]: host abaconcy; command line: /usr/bin/autopkgtest -U -B 
. --test-name=ssh-gssapi -- lxd autopkgtest/ubuntu/oracular/amd64
autopkgtest [11:37:39]: testbed dpkg architecture: amd64
autopkgtest [11:37:39]: testbed apt version: 2.9.8
autopkgtest [11:37:39]: @@@@@@@@@@@@@@@@@@@@ test bed setup
[...]
autopkgtest [11:39:24]: test ssh-gssapi: [-----------------------
Generating public/private ed25519 key pair.
Your identification has been saved in /root/.ssh/id_ed25519
Your public key has been saved in /root/.ssh/id_ed25519.pub
The key fingerprint is:
SHA256:nfzzPGYVv5pAD0m7vBb9qFZvuo8U1tumvTK4wGEvIsk root@autopkgtest-lxd-coegkp
The key's randomart image is:
+--[ED25519 256]--+
|                 |
|                 |
|           .     |
|         o..o .. |
|        So+=.o .o|
|    . . o =o=o. =|
|     E . + =*o+o+|
|      . . o++B*O |
|          o+oO%+o|
+----[SHA256]-----+
## Setting up test environment
## Creating Kerberos realm EXAMPLE.FAKE
Initializing database '/var/lib/krb5kdc/principal' for realm 'EXAMPLE.FAKE',
master key name 'K/m...@example.fake'
## Creating principals
Authenticating as principal root/ad...@example.fake with password.
Principal "testuser1...@example.fake" created.
Authenticating as principal root/ad...@example.fake with password.
Principal "host/sshd-gssapi.example.f...@example.fake" created.
## Extracting service principal host/sshd-gssapi.example.fake
Authenticating as principal root/ad...@example.fake with password.
Entry for principal host/sshd-gssapi.example.fake with kvno 2, encryption type 
aes256-cts-hmac-sha1-96 added to keytab WRFILE:/etc/krb5.keytab.
Entry for principal host/sshd-gssapi.example.fake with kvno 2, encryption type 
aes128-cts-hmac-sha1-96 added to keytab WRFILE:/etc/krb5.keytab.
## Adjusting /etc/krb5.conf
## TESTS

## TEST test_gssapi_login
## Configuring sshd for gssapi-with-mic authentication
## Restarting ssh
## Obtaining TGT
Password for testuser1...@example.fake: 
Ticket cache: FILE:/tmp/krb5cc_0
Default principal: testuser1...@example.fake

Valid starting     Expires            Service principal
12/16/24 10:39:25  12/16/24 20:39:25  krbtgt/example.f...@example.fake
        renew until 12/17/24 10:39:25

## ssh'ing into localhost using gssapi-with-mic auth
Warning: Permanently added 'sshd-gssapi.example.fake' (ED25519) to the list of 
known hosts.
Mon Dec 16 10:39:25 UTC 2024

## checking that we got a service ticket for ssh (host/)
12/16/24 10:39:25  12/16/24 20:39:25  host/sshd-gssapi.example.fake@
        Ticket server: host/sshd-gssapi.example.f...@example.fake

## Checking ssh logs to confirm gssapi-with-mic auth was used
Dec 16 10:39:25 sshd-gssapi.example.fake sshd[1778]: Accepted gssapi-with-mic 
for testuser1678 from 127.0.0.1 port 41534 ssh2: testuser1...@example.fake
## PASS test_gssapi_login

## TEST test_gssapi_keyex_login
## Configuring sshd for gssapi-keyex authentication
## Restarting ssh
## Obtaining TGT
Password for testuser1...@example.fake: 
Ticket cache: FILE:/tmp/krb5cc_0
Default principal: testuser1...@example.fake

Valid starting     Expires            Service principal
12/16/24 10:39:25  12/16/24 20:39:25  krbtgt/example.f...@example.fake
        renew until 12/17/24 10:39:25

## ssh'ing into localhost using gssapi-keyex auth
Mon Dec 16 10:39:26 UTC 2024

## checking that we got a service ticket for ssh (host/)
12/16/24 10:39:25  12/16/24 20:39:25  host/sshd-gssapi.example.fake@
        Ticket server: host/sshd-gssapi.example.f...@example.fake

## Checking ssh logs to confirm gssapi-keyex auth was used
Dec 16 10:39:26 sshd-gssapi.example.fake sshd[1861]: Accepted gssapi-keyex for 
testuser1678 from 127.0.0.1 port 41548 ssh2: testuser1...@example.fake
## PASS test_gssapi_keyex_login

## TEST test_gssapi_keyex_pubkey_fallback
## Configuring sshd for gssapi-keyex authentication
## Restarting ssh
## Obtaining TGT
Password for testuser1...@example.fake: 
Ticket cache: FILE:/tmp/krb5cc_0
Default principal: testuser1...@example.fake

Valid starting     Expires            Service principal
12/16/24 10:39:26  12/16/24 20:39:26  krbtgt/example.f...@example.fake
        renew until 12/17/24 10:39:26

## ssh'ing into localhost using gssapi-keyex auth
sign_and_send_pubkey: internal error: initial hostkey not recorded
## FAIL test_gssapi_keyex_pubkey_fallback

## Something failed

## klist
Ticket cache: FILE:/tmp/krb5cc_0
Default principal: testuser1...@example.fake

Valid starting     Expires            Service principal
12/16/24 10:39:26  12/16/24 20:39:26  krbtgt/example.f...@example.fake
        renew until 12/17/24 10:39:26
12/16/24 10:39:26  12/16/24 20:39:26  host/sshd-gssapi.example.fake@
        renew until 12/17/24 10:39:26
        Ticket server: host/sshd-gssapi.example.f...@example.fake

## ssh server log
Dec 16 10:39:25 sshd-gssapi.example.fake systemd[1]: Starting ssh.service - 
OpenBSD Secure Shell server...
Dec 16 10:39:25 sshd-gssapi.example.fake sshd[1768]: Server listening on 
0.0.0.0 port 22.
Dec 16 10:39:25 sshd-gssapi.example.fake sshd[1768]: Server listening on :: 
port 22.
Dec 16 10:39:25 sshd-gssapi.example.fake systemd[1]: Started ssh.service - 
OpenBSD Secure Shell server.
Dec 16 10:39:25 sshd-gssapi.example.fake sshd[1778]: Authorized to 
testuser1678, krb5 principal testuser1...@example.fake (krb5_kuserok)
Dec 16 10:39:25 sshd-gssapi.example.fake sshd[1778]: Accepted gssapi-with-mic 
for testuser1678 from 127.0.0.1 port 41534 ssh2: testuser1...@example.fake
Dec 16 10:39:25 sshd-gssapi.example.fake sshd[1778]: pam_unix(sshd:session): 
session opened for user testuser1678(uid=1001) by testuser1678(uid=0)
Dec 16 10:39:25 sshd-gssapi.example.fake sshd[1778]: pam_systemd(sshd:session): 
New sd-bus connection (system-bus-pam-systemd-1778) opened.
Dec 16 10:39:25 sshd-gssapi.example.fake sshd[1778]: pam_unix(sshd:session): 
session closed for user testuser1678
Dec 16 10:39:25 sshd-gssapi.example.fake sshd[1778]: pam_systemd(sshd:session): 
New sd-bus connection (system-bus-pam-systemd-1778) opened.
Dec 16 10:39:25 sshd-gssapi.example.fake sshd[1768]: Received signal 15; 
terminating.
Dec 16 10:39:25 sshd-gssapi.example.fake systemd[1]: Stopping ssh.service - 
OpenBSD Secure Shell server...
Dec 16 10:39:25 sshd-gssapi.example.fake systemd[1]: ssh.service: Deactivated 
successfully.
Dec 16 10:39:25 sshd-gssapi.example.fake systemd[1]: Stopped ssh.service - 
OpenBSD Secure Shell server.
Dec 16 10:39:25 sshd-gssapi.example.fake systemd[1]: Starting ssh.service - 
OpenBSD Secure Shell server...
Dec 16 10:39:25 sshd-gssapi.example.fake sshd[1851]: Server listening on 
0.0.0.0 port 22.
Dec 16 10:39:25 sshd-gssapi.example.fake sshd[1851]: Server listening on :: 
port 22.
Dec 16 10:39:25 sshd-gssapi.example.fake systemd[1]: Started ssh.service - 
OpenBSD Secure Shell server.
Dec 16 10:39:26 sshd-gssapi.example.fake sshd[1861]: Authorized to 
testuser1678, krb5 principal testuser1...@example.fake (krb5_kuserok)
Dec 16 10:39:26 sshd-gssapi.example.fake sshd[1861]: Accepted gssapi-keyex for 
testuser1678 from 127.0.0.1 port 41548 ssh2: testuser1...@example.fake
Dec 16 10:39:26 sshd-gssapi.example.fake sshd[1861]: pam_unix(sshd:session): 
session opened for user testuser1678(uid=1001) by testuser1678(uid=0)
Dec 16 10:39:26 sshd-gssapi.example.fake sshd[1861]: pam_systemd(sshd:session): 
New sd-bus connection (system-bus-pam-systemd-1861) opened.
Dec 16 10:39:26 sshd-gssapi.example.fake sshd[1861]: pam_unix(sshd:session): 
session closed for user testuser1678
Dec 16 10:39:26 sshd-gssapi.example.fake sshd[1861]: pam_systemd(sshd:session): 
New sd-bus connection (system-bus-pam-systemd-1861) opened.
Dec 16 10:39:26 sshd-gssapi.example.fake sshd[1851]: Received signal 15; 
terminating.
Dec 16 10:39:26 sshd-gssapi.example.fake systemd[1]: Stopping ssh.service - 
OpenBSD Secure Shell server...
Dec 16 10:39:26 sshd-gssapi.example.fake systemd[1]: ssh.service: Deactivated 
successfully.
Dec 16 10:39:26 sshd-gssapi.example.fake systemd[1]: Stopped ssh.service - 
OpenBSD Secure Shell server.
Dec 16 10:39:26 sshd-gssapi.example.fake systemd[1]: Starting ssh.service - 
OpenBSD Secure Shell server...
Dec 16 10:39:26 sshd-gssapi.example.fake sshd[1951]: Server listening on 
0.0.0.0 port 22.
Dec 16 10:39:26 sshd-gssapi.example.fake sshd[1951]: Server listening on :: 
port 22.
Dec 16 10:39:26 sshd-gssapi.example.fake systemd[1]: Started ssh.service - 
OpenBSD Secure Shell server.
Dec 16 10:39:26 sshd-gssapi.example.fake sshd[1962]: Connection closed by 
authenticating user testuser1678-2 127.0.0.1 port 41554 [preauth]

## Kerberos KDC logs
Dec 16 10:39:21 autopkgtest-lxd-coegkp systemd[1]: Starting krb5-kdc.service - 
Kerberos 5 Key Distribution Center...
Dec 16 10:39:21 autopkgtest-lxd-coegkp (krb5kdc)[1422]: krb5-kdc.service: 
Referenced but unset environment variable evaluates to an empty string: 
DAEMON_ARGS
Dec 16 10:39:21 autopkgtest-lxd-coegkp krb5kdc[1422]: Cannot open DB2 database 
'/var/lib/krb5kdc/principal': No such file or directory - while initializing 
database for realm ATHENA.MIT.EDU
Dec 16 10:39:21 autopkgtest-lxd-coegkp krb5kdc[1422]: krb5kdc: cannot 
initialize realm ATHENA.MIT.EDU - see log file for details
Dec 16 10:39:21 autopkgtest-lxd-coegkp systemd[1]: krb5-kdc.service: Control 
process exited, code=exited, status=1/FAILURE
Dec 16 10:39:21 autopkgtest-lxd-coegkp systemd[1]: krb5-kdc.service: Failed 
with result 'exit-code'.
Dec 16 10:39:21 autopkgtest-lxd-coegkp systemd[1]: Failed to start 
krb5-kdc.service - Kerberos 5 Key Distribution Center.
Dec 16 10:39:25 sshd-gssapi.example.fake systemd[1]: Starting krb5-kdc.service 
- Kerberos 5 Key Distribution Center...
Dec 16 10:39:25 sshd-gssapi.example.fake (krb5kdc)[1753]: krb5-kdc.service: 
Referenced but unset environment variable evaluates to an empty string: 
DAEMON_ARGS
Dec 16 10:39:25 sshd-gssapi.example.fake krb5kdc[1753]: preauth spake failed to 
initialize: No SPAKE preauth groups configured
Dec 16 10:39:25 sshd-gssapi.example.fake krb5kdc[1753]: setting up network...
Dec 16 10:39:25 sshd-gssapi.example.fake krb5kdc[1753]: Setting up UDP socket 
for address 0.0.0.0.750
Dec 16 10:39:25 sshd-gssapi.example.fake krb5kdc[1753]: Setting pktinfo on 
socket 0.0.0.0.750
Dec 16 10:39:25 sshd-gssapi.example.fake krb5kdc[1753]: Setting up UDP socket 
for address ::.750
Dec 16 10:39:25 sshd-gssapi.example.fake krb5kdc[1753]: 
setsockopt(10,IPV6_V6ONLY,1) worked
Dec 16 10:39:25 sshd-gssapi.example.fake krb5kdc[1753]: Setting pktinfo on 
socket ::.750
Dec 16 10:39:25 sshd-gssapi.example.fake krb5kdc[1753]: Setting up UDP socket 
for address 0.0.0.0.88
Dec 16 10:39:25 sshd-gssapi.example.fake krb5kdc[1753]: Setting pktinfo on 
socket 0.0.0.0.88
Dec 16 10:39:25 sshd-gssapi.example.fake krb5kdc[1753]: Setting up UDP socket 
for address ::.88
Dec 16 10:39:25 sshd-gssapi.example.fake krb5kdc[1753]: 
setsockopt(12,IPV6_V6ONLY,1) worked
Dec 16 10:39:25 sshd-gssapi.example.fake krb5kdc[1753]: Setting pktinfo on 
socket ::.88
Dec 16 10:39:25 sshd-gssapi.example.fake krb5kdc[1753]: Setting up TCP socket 
for address 0.0.0.0.88
Dec 16 10:39:25 sshd-gssapi.example.fake krb5kdc[1753]: Setting up TCP socket 
for address ::.88
Dec 16 10:39:25 sshd-gssapi.example.fake krb5kdc[1753]: 
setsockopt(14,IPV6_V6ONLY,1) worked
Dec 16 10:39:25 sshd-gssapi.example.fake krb5kdc[1753]: set up 6 sockets
Dec 16 10:39:25 sshd-gssapi.example.fake systemd[1]: Started krb5-kdc.service - 
Kerberos 5 Key Distribution Center.
Dec 16 10:39:25 sshd-gssapi.example.fake krb5kdc[1755]: commencing operation
Dec 16 10:39:25 sshd-gssapi.example.fake krb5kdc[1755]: AS_REQ (8 etypes 
{aes256-cts-hmac-sha1-96(18), aes128-cts-hmac-sha1-96(17), 
aes256-cts-hmac-sha384-192(20), aes128-cts-hmac-sha256-128(19), 
DEPRECATED:des3-cbc-sha1(16), DEPRECATED:arcfour-hmac(23), 
camellia128-cts-cmac(25), camellia256-cts-cmac(26)}) 127.0.0.1: NEEDED_PREAUTH: 
testuser1...@example.fake for krbtgt/example.f...@example.fake, Additional 
pre-authentication required
Dec 16 10:39:25 sshd-gssapi.example.fake krb5kdc[1755]: AS_REQ (8 etypes 
{aes256-cts-hmac-sha1-96(18), aes128-cts-hmac-sha1-96(17), 
aes256-cts-hmac-sha384-192(20), aes128-cts-hmac-sha256-128(19), 
DEPRECATED:des3-cbc-sha1(16), DEPRECATED:arcfour-hmac(23), 
camellia128-cts-cmac(25), camellia256-cts-cmac(26)}) 127.0.0.1: ISSUE: authtime 
1734345565, etypes {rep=aes256-cts-hmac-sha1-96(18), 
tkt=aes256-cts-hmac-sha1-96(18), ses=aes256-cts-hmac-sha1-96(18)}, 
testuser1...@example.fake for krbtgt/example.f...@example.fake
Dec 16 10:39:25 sshd-gssapi.example.fake krb5kdc[1755]: TGS_REQ (8 etypes 
{aes256-cts-hmac-sha1-96(18), aes128-cts-hmac-sha1-96(17), 
aes256-cts-hmac-sha384-192(20), aes128-cts-hmac-sha256-128(19), 
DEPRECATED:des3-cbc-sha1(16), DEPRECATED:arcfour-hmac(23), 
camellia128-cts-cmac(25), camellia256-cts-cmac(26)}) 127.0.0.1: ISSUE: authtime 
1734345565, etypes {rep=aes256-cts-hmac-sha1-96(18), 
tkt=aes256-cts-hmac-sha1-96(18), ses=aes256-cts-hmac-sha1-96(18)}, 
testuser1...@example.fake for host/sshd-gssapi.example.f...@example.fake
Dec 16 10:39:25 sshd-gssapi.example.fake krb5kdc[1755]: AS_REQ (8 etypes 
{aes256-cts-hmac-sha1-96(18), aes128-cts-hmac-sha1-96(17), 
aes256-cts-hmac-sha384-192(20), aes128-cts-hmac-sha256-128(19), 
DEPRECATED:des3-cbc-sha1(16), DEPRECATED:arcfour-hmac(23), 
camellia128-cts-cmac(25), camellia256-cts-cmac(26)}) 127.0.0.1: NEEDED_PREAUTH: 
testuser1...@example.fake for krbtgt/example.f...@example.fake, Additional 
pre-authentication required
Dec 16 10:39:25 sshd-gssapi.example.fake krb5kdc[1755]: AS_REQ (8 etypes 
{aes256-cts-hmac-sha1-96(18), aes128-cts-hmac-sha1-96(17), 
aes256-cts-hmac-sha384-192(20), aes128-cts-hmac-sha256-128(19), 
DEPRECATED:des3-cbc-sha1(16), DEPRECATED:arcfour-hmac(23), 
camellia128-cts-cmac(25), camellia256-cts-cmac(26)}) 127.0.0.1: ISSUE: authtime 
1734345565, etypes {rep=aes256-cts-hmac-sha1-96(18), 
tkt=aes256-cts-hmac-sha1-96(18), ses=aes256-cts-hmac-sha1-96(18)}, 
testuser1...@example.fake for krbtgt/example.f...@example.fake
Dec 16 10:39:25 sshd-gssapi.example.fake krb5kdc[1755]: TGS_REQ (8 etypes 
{aes256-cts-hmac-sha1-96(18), aes128-cts-hmac-sha1-96(17), 
aes256-cts-hmac-sha384-192(20), aes128-cts-hmac-sha256-128(19), 
DEPRECATED:des3-cbc-sha1(16), DEPRECATED:arcfour-hmac(23), 
camellia128-cts-cmac(25), camellia256-cts-cmac(26)}) 127.0.0.1: ISSUE: authtime 
1734345565, etypes {rep=aes256-cts-hmac-sha1-96(18), 
tkt=aes256-cts-hmac-sha1-96(18), ses=aes256-cts-hmac-sha1-96(18)}, 
testuser1...@example.fake for host/sshd-gssapi.example.f...@example.fake
Dec 16 10:39:26 sshd-gssapi.example.fake krb5kdc[1755]: AS_REQ (8 etypes 
{aes256-cts-hmac-sha1-96(18), aes128-cts-hmac-sha1-96(17), 
aes256-cts-hmac-sha384-192(20), aes128-cts-hmac-sha256-128(19), 
DEPRECATED:des3-cbc-sha1(16), DEPRECATED:arcfour-hmac(23), 
camellia128-cts-cmac(25), camellia256-cts-cmac(26)}) 127.0.0.1: NEEDED_PREAUTH: 
testuser1...@example.fake for krbtgt/example.f...@example.fake, Additional 
pre-authentication required
Dec 16 10:39:26 sshd-gssapi.example.fake krb5kdc[1755]: AS_REQ (8 etypes 
{aes256-cts-hmac-sha1-96(18), aes128-cts-hmac-sha1-96(17), 
aes256-cts-hmac-sha384-192(20), aes128-cts-hmac-sha256-128(19), 
DEPRECATED:des3-cbc-sha1(16), DEPRECATED:arcfour-hmac(23), 
camellia128-cts-cmac(25), camellia256-cts-cmac(26)}) 127.0.0.1: ISSUE: authtime 
1734345566, etypes {rep=aes256-cts-hmac-sha1-96(18), 
tkt=aes256-cts-hmac-sha1-96(18), ses=aes256-cts-hmac-sha1-96(18)}, 
testuser1...@example.fake for krbtgt/example.f...@example.fake
Dec 16 10:39:26 sshd-gssapi.example.fake krb5kdc[1755]: TGS_REQ (8 etypes 
{aes256-cts-hmac-sha1-96(18), aes128-cts-hmac-sha1-96(17), 
aes256-cts-hmac-sha384-192(20), aes128-cts-hmac-sha256-128(19), 
DEPRECATED:des3-cbc-sha1(16), DEPRECATED:arcfour-hmac(23), 
camellia128-cts-cmac(25), camellia256-cts-cmac(26)}) 127.0.0.1: ISSUE: authtime 
1734345566, etypes {rep=aes256-cts-hmac-sha1-96(18), 
tkt=aes256-cts-hmac-sha1-96(18), ses=aes256-cts-hmac-sha1-96(18)}, 
testuser1...@example.fake for host/sshd-gssapi.example.f...@example.fake

## Kerberos Admin server logs
Dec 16 10:39:22 autopkgtest-lxd-coegkp systemd[1]: Started 
krb5-admin-server.service - Kerberos 5 Admin Server.
Dec 16 10:39:22 autopkgtest-lxd-coegkp (kadmind)[1527]: 
krb5-admin-server.service: Referenced but unset environment variable evaluates 
to an empty string: DAEMON_ARGS
Dec 16 10:39:22 autopkgtest-lxd-coegkp kadmind[1527]: kadmind: Cannot open DB2 
database '/var/lib/krb5kdc/principal': No such file or directory while 
initializing, aborting
Dec 16 10:39:22 autopkgtest-lxd-coegkp kadmind[1527]: Cannot open DB2 database 
'/var/lib/krb5kdc/principal': No such file or directory while initializing, 
aborting
Dec 16 10:39:22 autopkgtest-lxd-coegkp systemd[1]: krb5-admin-server.service: 
Main process exited, code=exited, status=1/FAILURE
Dec 16 10:39:22 autopkgtest-lxd-coegkp systemd[1]: krb5-admin-server.service: 
Failed with result 'exit-code'.
Dec 16 10:39:25 sshd-gssapi.example.fake systemd[1]: Started 
krb5-admin-server.service - Kerberos 5 Admin Server.
Dec 16 10:39:25 sshd-gssapi.example.fake (kadmind)[1754]: 
krb5-admin-server.service: Referenced but unset environment variable evaluates 
to an empty string: DAEMON_ARGS
Dec 16 10:39:25 sshd-gssapi.example.fake kadmind[1754]: No dictionary file 
specified, continuing without one.
Dec 16 10:39:25 sshd-gssapi.example.fake kadmind[1754]: setting up network...
Dec 16 10:39:25 sshd-gssapi.example.fake kadmind[1754]: Setting up UDP socket 
for address 0.0.0.0.464
Dec 16 10:39:25 sshd-gssapi.example.fake kadmind[1754]: Setting pktinfo on 
socket 0.0.0.0.464
Dec 16 10:39:25 sshd-gssapi.example.fake kadmind[1754]: Setting up UDP socket 
for address ::.464
Dec 16 10:39:25 sshd-gssapi.example.fake kadmind[1754]: 
setsockopt(10,IPV6_V6ONLY,1) worked
Dec 16 10:39:25 sshd-gssapi.example.fake kadmind[1754]: Setting pktinfo on 
socket ::.464
Dec 16 10:39:25 sshd-gssapi.example.fake kadmind[1754]: Setting up TCP socket 
for address 0.0.0.0.464
Dec 16 10:39:25 sshd-gssapi.example.fake kadmind[1754]: Setting up TCP socket 
for address ::.464
Dec 16 10:39:25 sshd-gssapi.example.fake kadmind[1754]: 
setsockopt(12,IPV6_V6ONLY,1) worked
Dec 16 10:39:25 sshd-gssapi.example.fake kadmind[1754]: Setting up RPC socket 
for address 0.0.0.0.749
Dec 16 10:39:25 sshd-gssapi.example.fake kadmind[1754]: Setting up RPC socket 
for address ::.749
Dec 16 10:39:25 sshd-gssapi.example.fake kadmind[1754]: 
setsockopt(14,IPV6_V6ONLY,1) worked
Dec 16 10:39:25 sshd-gssapi.example.fake kadmind[1754]: set up 6 sockets
Dec 16 10:39:25 sshd-gssapi.example.fake kadmind[1754]: kadmind: starting...
Dec 16 10:39:25 sshd-gssapi.example.fake kadmind[1754]: No dictionary file 
specified, continuing without one.
Dec 16 10:39:25 sshd-gssapi.example.fake kadmind[1754]: No dictionary file 
specified, continuing without one.
Dec 16 10:39:25 sshd-gssapi.example.fake kadmind[1754]: starting

## Skipping cleanup to facilitate troubleshooting
autopkgtest [11:39:26]: test ssh-gssapi: -----------------------]
autopkgtest [11:39:27]: test ssh-gssapi:  - - - - - - - - - - results - - - - - 
- - - - -
ssh-gssapi           FAIL non-zero exit status 253
autopkgtest [11:39:27]: @@@@@@@@@@@@@@@@@@@@ summary
ssh-gssapi           FAIL non-zero exit status 253

** Patch added: "dep8-verifier.diff"
   
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/2028282/+attachment/5845545/+files/dep8-verifier.diff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2028282

Title:
  SSH pubkey authetication fails when GSSAPI enabled

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/2028282/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to