[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
kadmin bad response during sendauth exchange
Hi all,
I am testing Heimdal with an openldap back-end and so far everything
is working quite well. System details are as follows:
OS: Debian ETCH
Kerberos: Heimdal 0.7.2
LDAP: openldap 2.3.30
When running "kadmin -l" and issuing a command such as:
kadmin> list *
I get a listing of all principals as requested. However, if I was to
run simply: kadmin as the command and attempt to get a listing, I see:
kadmin> list *
kadmin: kadm5_get_principals: Bad response (during sendauth exchange)
Heimdal log reports the following:
2007-07-26T15:47:35 Failed processing 35 byte request from IPv4:192.168.0.110
During kadmin -l operations, I can see ldap sasl-regex being applied
successfully and acls, etc. all work quite well. Am I simply
misunderstanding how this is supposed to work?
Please find the strace pasted at the bottom for heimdal as well as kadmin.
Thank you.
----- Heimdal strace
Process 13805 attached - interrupt to quit
select(7, [3 4 5 6], NULL, NULL, {3, 670000}) = 0 (Timeout)
select(7, [3 4 5 6], NULL, NULL, {4, 0}) = 0 (Timeout)
select(7, [3 4 5 6], NULL, NULL, {4, 0}) = 1 (in [6], left {0, 940000})
accept(6, {sa_family=AF_INET, sin_port=htons(4981),
sin_addr=inet_addr("192.168.0.110")}, [16]) = 7
time(NULL) = 1185448679
time(NULL) = 1185448679
select(8, [3 4 5 6 7], NULL, NULL, {4, 0}) = 1 (in [7], left {3, 990000})
recvfrom(7, "\0\0\0\23KRB5_SENDAUTH_V1.0\0", 1024, 0, NULL, NULL) = 23
gettimeofday({1185448679, 914244}, NULL) = 0
time(NULL) = 1185448679
stat64("/etc/localtime", {st_mode=S_IFREG|0644, st_size=149, ...}) = 0
open("/var/log/heimdal-kdc.log",
O_WRONLY|O_APPEND|O_CREAT|O_LARGEFILE, 0666) = 8
fstat64(8, {st_mode=S_IFREG|0600, st_size=25377, ...}) = 0
mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1,
0) = 0xb7fd7000
fstat64(8, {st_mode=S_IFREG|0600, st_size=25377, ...}) = 0
_llseek(8, 25377, [25377], SEEK_SET) = 0
write(8, "2007-07-26T16:17:59 Failed proce"..., 78) = 78
close(8) = 0
munmap(0xb7fd7000, 4096) = 0
close(7) = 0
Process 13805 detached
--- end strace
--- start kadmin strace
connect(3, {sa_family=AF_INET, sin_port=htons(749),
sin_addr=inet_addr("192.168.0.110")}, 16) = 0
getuid32() = 0
geteuid32() = 0
getgid32() = 0
getegid32() = 0
getuid32() = 0
open("/tmp/krb5cc_0", O_RDONLY|O_LARGEFILE) = 4
fcntl64(4, F_SETLKW64, {type=F_RDLCK, whence=SEEK_SET, start=0,
len=0}, 0xbf994514) = 0
dup(4) = 5
read(5, "\5", 1) = 1
read(5, "\4", 1) = 1
read(5, "\0\0", 2) = 2
read(5, "\0\0\0\1", 4) = 4
read(5, "\0\0\0\2", 4) = 4
read(5, "\0\0\0\v", 4) = 4
read(5, "EMERGEN.BIZ", 11) = 11
read(5, "\0\0\0\6", 4) = 4
read(5, "eadmin", 6) = 6
read(5, "\0\0\0\5", 4) = 4
read(5, "admin", 5) = 5
close(5) = 0
flock(4, LOCK_UN) = 0
close(4) = 0
open("/tmp/krb5cc_0", O_RDONLY|O_LARGEFILE) = 4
fcntl64(4, F_SETLKW64, {type=F_RDLCK, whence=SEEK_SET, start=0,
len=0}, 0xbf994464) = 0
dup(4) = 5
read(5, "\5", 1) = 1
read(5, "\4", 1) = 1
read(5, "\0\0", 2) = 2
read(5, "\0\0\0\1", 4) = 4
read(5, "\0\0\0\2", 4) = 4
read(5, "\0\0\0\v", 4) = 4
read(5, "EMERGEN.BIZ", 11) = 11
read(5, "\0\0\0\6", 4) = 4
read(5, "eadmin", 6) = 6
read(5, "\0\0\0\5", 4) = 4
read(5, "admin", 5) = 5
flock(4, LOCK_UN) = 0
fcntl64(4, F_SETLKW64, {type=F_RDLCK, whence=SEEK_SET, start=0,
len=0}, 0xbf994504) = 0
read(5, "\0\0\0\1", 4) = 4
read(5, "\0\0\0\2", 4) = 4
read(5, "\0\0\0\v", 4) = 4
read(5, "EMERGEN.BIZ", 11) = 11
read(5, "\0\0\0\6", 4) = 4
read(5, "eadmin", 6) = 6
read(5, "\0\0\0\5", 4) = 4
read(5, "admin", 5) = 5
read(5, "\0\0\0\1", 4) = 4
read(5, "\0\0\0\2", 4) = 4
read(5, "\0\0\0\v", 4) = 4
read(5, "EMERGEN.BIZ", 11) = 11
read(5, "\0\0\0\6", 4) = 4
read(5, "krbtgt", 6) = 6
read(5, "\0\0\0\v", 4) = 4
read(5, "EMERGEN.BIZ", 11) = 11
read(5, "\0\1", 2) = 2
read(5, "\0\0\0\10", 4) = 4
read(5, "\272X\332\241O\205\25\242", 8) = 8
read(5, "F\250\202\270", 4) = 4
read(5, "F\250\202\270", 4) = 4
read(5, "F\251\3248", 4) = 4
read(5, "\0\0\0\0", 4) = 4
read(5, "\0", 1) = 1
read(5, "\0@\0\0", 4) = 4
read(5, "\0\0\0\1", 4) = 4
read(5, "\0\2", 2) = 2
read(5, "\0\0\0\4", 4) = 4
read(5, "\300\250\0n", 4) = 4
read(5, "\0\0\0\0", 4) = 4
read(5, "\0\0\0\372", 4) = 4
read(5, "a\201\3670\201\364\240\3\2\1\5\241\r\33\vEMERGEN.BIZ\242"...,
250) = 250
read(5, "\0\0\0\0", 4) = 4
flock(4, LOCK_UN) = 0
fcntl64(4, F_SETLKW64, {type=F_RDLCK, whence=SEEK_SET, start=0,
len=0}, 0xbf994504) = 0
read(5, "\0\0\0\1", 4) = 4
read(5, "\0\0\0\2", 4) = 4
read(5, "\0\0\0\v", 4) = 4
read(5, "EMERGEN.BIZ", 11) = 11
read(5, "\0\0\0\6", 4) = 4
read(5, "eadmin", 6) = 6
read(5, "\0\0\0\5", 4) = 4
read(5, "admin", 5) = 5
read(5, "\0\0\0\1", 4) = 4
read(5, "\0\0\0\2", 4) = 4
read(5, "\0\0\0\v", 4) = 4
read(5, "EMERGEN.BIZ", 11) = 11
read(5, "\0\0\0\6", 4) = 4
read(5, "kadmin", 6) = 6
read(5, "\0\0\0\5", 4) = 4
read(5, "admin", 5) = 5
read(5, "\0\1", 2) = 2
read(5, "\0\0\0\10", 4) = 4
read(5, "\302\23\200[\25\351;\224", 8) = 8
read(5, "F\250\202\270", 4) = 4
read(5, "F\250\202\276", 4) = 4
read(5, "F\250\220\316", 4) = 4
read(5, "\0\0\0\0", 4) = 4
read(5, "\0", 1) = 1
read(5, "\0\10\0\0", 4) = 4
read(5, "\0\0\0\1", 4) = 4
read(5, "\0\2", 2) = 2
read(5, "\0\0\0\4", 4) = 4
read(5, "\300\250\0n", 4) = 4
read(5, "\0\0\0\0", 4) = 4
read(5, "\0\0\1\5", 4) = 4
read(5, "a\202\1\0010\201\376\240\3\2\1\5\241\r\33\vEMERGEN.BIZ"..., 261) = 261
read(5, "\0\0\0\0", 4) = 4
flock(4, LOCK_UN) = 0
close(5) = 0
close(4) = 0
time(NULL) = 1185448679
write(3, "\0\0\0\23", 4) = 4
write(3, "KRB5_SENDAUTH_V1.0\0", 19) = 19
write(3, "\0\0\0\10", 4) = 4
write(3, "KADM0.1\0", 8) = 8
read(3, 0xbf99473b, 1) = -1 ECONNRESET (Connection
reset by peer)
close(3) = 0
write(2, "kadmin: ", 8kadmin: ) = 8
write(2, "kadm5_get_principals: read: Conn"...,
52kadm5_get_principals: read: Connection reset by peer) = 52
write(2, "\n", 1
) = 1
rt_sigaction(SIGINT, {0xb7edfea0, [], SA_RESTART}, {SIG_IGN}, 8) = 0
ioctl(0, FIONREAD, [0]) = 0
ioctl(0, SNDCTL_TMR_TIMEBASE or TCGETS, {B38400 opost isig icanon echo ...}) = 0
ioctl(0, SNDCTL_TMR_TIMEBASE or TCGETS, {B38400 opost isig icanon echo ...}) = 0
ioctl(0, SNDCTL_TMR_STOP or TCSETSW, {B38400 opost isig -icanon -echo ...}) = 0
ioctl(0, SNDCTL_TMR_TIMEBASE or TCGETS, {B38400 opost isig -icanon
-echo ...}) = 0
rt_sigprocmask(SIG_BLOCK, [HUP INT QUIT TERM CONT STOP TSTP WINCH], [], 8) = 0
rt_sigaction(SIGINT, {0xb7ed006d, [], SA_RESTART}, {0xb7edfea0, [],
SA_RESTART}, 8) = 0
rt_sigaction(SIGTSTP, {0xb7ed006d, [], SA_RESTART}, {SIG_DFL}, 8) = 0
rt_sigaction(SIGSTOP, {0xb7ed006d, [], SA_RESTART}, {SIG_DFL}, 8) = -1
EINVAL (Invalid argument)
rt_sigaction(SIGQUIT, {0xb7ed006d, [], SA_RESTART}, {SIG_DFL}, 8) = 0
rt_sigaction(SIGHUP, {0xb7ed006d, [], SA_RESTART}, {SIG_DFL}, 8) = 0
rt_sigaction(SIGTERM, {0xb7ed006d, [], SA_RESTART}, {SIG_DFL}, 8) = 0
rt_sigaction(SIGCONT, {0xb7ed006d, [], SA_RESTART}, {SIG_DFL}, 8) = 0
rt_sigaction(SIGWINCH, {0xb7ed006d, [], SA_RESTART}, {SIG_DFL}, 8) = 0
rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
rt_sigprocmask(SIG_BLOCK, [WINCH], [], 8) = 0
ioctl(0, TIOCGWINSZ, {ws_row=61, ws_col=182, ws_xpixel=0, ws_ypixel=0}) = 0
rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
write(1, "kadmin> ", 8kadmin> ) = 8
read(0,
--- end strace.