-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
GSSAPI Kerberos Authentication: wrong Token ID #2022
Comments
I have the same problem in danielqsj/kafka_exporter#339 |
I got it :
realm is "TEST.COM" |
@ilyadiff I started to look into it, but feels like it is much work there (never touched Go or Kerberos protocol before) so unless someone else pick the issue, the fastest solution is probably to make your Kerberos uses modern enctypes @wormlocust - unfortunately your solution didn't work for me, so probably you had some other issue :) but maybe it would help someone else |
Update to the previous message I've started to look into the issue and while I was able to when connecting to Kafka brokers I am getting
So investigation continues |
This comment was marked as outdated.
This comment was marked as outdated.
Thank you for taking the time to raise this issue. However, it has not had any activity on it in the past 90 days and will be closed in 30 days if no updates occur. |
Versions
Configuration
Sarama setup
Kafka setup is unknown
Logs
logs: CLICK ME
Problem Description
For some reasons it looks like sarama has difficulties connecting to our team's Kafka using keytab
I've seen similar issue raised #1400 but it was closed with suggested solution that didn't work for me - unfortunately
I've used different options for krb5.conf and keytab file
1.
with keytab encrypted with RC4-HMAC gives an error I outlined above
2.
with keytab encrypted with RC4-HMAC gives an error
which I believe means that there is a mismatch in encryption, so I've tried keytab encrypted with AES256-CTS-HMAC-SHA1-96 and it gives an error
which I believe means that our Kerberos system is not set to accept AES256-CTS-HMAC-SHA1-96 at TGS step
So I tried to change default_tkt_enctypes = aes256-cts-hmac-sha1-96 to default_tkt_enctypes = rc4-hmac which returned an initial error (about wrong Token ID)
Any suggestions on how to get it working?
The text was updated successfully, but these errors were encountered: