AFS/Kerberos authentication problems on IRIX 6.5.15

David Steiner david.r.steiner at Dartmouth.EDU
Sat May 4 06:50:02 EST 2002


With a little help, I managed to get ssh to compile. (original post 
05.02.02) Now, I can login using an account that is local to the 
target machine but logins with  AFS accounts fail.

The details:
IRIX 6.5.15
ssh 3.1.p1
gcc 3.0.1
ssl-0.9.6c
zlib-1.1.4.

I am configuring with:

env CC=gcc CFLAGS=-g 
LDFLAGS=-Wl,-rpath,/usr/local/krb4/lib,-rpath,/usr/local/ssl/lib 
./configure --prefix=/usr/etc/ssh --with-afs=/usr/afsws 
--with-kerberos4=/usr/local/krb4 --sysconfdir=/etc/ssh 
--with-pid-dir=/var/run --with-ipv4-default 
--with-default-path=/usr/bin:/bin:/usr/bsd:/usr/sbin:/sbin:/usr/afsws/bin:/usr/local/bin

I also had to remove the first occurrence of '-ldes' from the LIBS in 
the makefile.

When trying to login with an AFS account the user sees "Permission denied"

Running 'sshd -d' on the server shows that the Kerberos 
authentication fails with "Principal unknown" (see debug output 
below). I have also attached my sshd_config file.

Any help would be greatly appreciated. TIA

=====Debug output (user names and IPs have been sanitized)=====

debug1: userauth-request for user user1 service ssh-connection method
	none
	debug1: attempt 0 failures 0
	Failed none for user1 from 192.xx.xx.xx port 49297 ssh2
	debug1: userauth-request for user user1 service ssh-connection method
	keyboard-interactive
	debug1: attempt 1 failures 1
	debug1: keyboard-interactive devs
	debug1: auth2_challenge: user=user1 devs=
	debug1: kbdint_alloc: devices ''
	Failed keyboard-interactive for user1 from 192.xx.xx.xx port 49297
	ssh2
	debug1: userauth-request for user user1 service ssh-connection method
	password
	debug1: attempt 2 failures 2
	kerberos-iv/udp unknown service, using default port 750
	debug1: Kerberos v4 password authentication for user1 failed:
	Principal unknown (kerberos)
	debug1: krb4_cleanup_proc called
	Failed password for user1 from 192.xx.xx.xx port 49297 ssh2

======sshd_config=========

	#       $OpenBSD: sshd_config,v 1.48 2002/02/19 02:50:59 deraadt Exp $

	# This is the sshd server system-wide configuration file.  See sshd(8)
	# for more information.

	# This sshd was compiled with 
PATH=/usr/bin:/bin:/usr/bsd:/usr/sbin:/sbin:/usr/afsws/bin:/usr/local/bin

	# The strategy used for options in the default sshd_config shipped with
	# OpenSSH is to specify options with their default value where
	# possible, but leave them commented.  Uncommented options change a
	# default value.

	Port 22
	Protocol 2,1
	ListenAddress 0.0.0.0
	#ListenAddress ::

	# HostKey for protocol version 1
	HostKey /etc/ssh/ssh_host_key
	# HostKeys for protocol version 2
	HostKey /etc/ssh/ssh_host_rsa_key
	HostKey /etc/ssh/ssh_host_dsa_key

	# Lifetime and size of ephemeral version 1 server key
	KeyRegenerationInterval 3600
	ServerKeyBits 768

	# Logging
	#obsoletes QuietMode and FascistLogging
	SyslogFacility AUTH
	LogLevel INFO

	# Authentication:

	LoginGraceTime 600
	PermitRootLogin no
	StrictModes yes

	RSAAuthentication yes
	PubkeyAuthentication yes
	AuthorizedKeysFile      .ssh/authorized_keys

	# rhosts authentication should not be used
	RhostsAuthentication no
	# Don't read the user's ~/.rhosts and ~/.shosts files
	IgnoreRhosts yes
	# For this to work you will also need host keys in 
	/etc/ssh/ssh_known_hosts
	RhostsRSAAuthentication yes
	# similar for protocol version 2
	HostbasedAuthentication no
	# Change to yes if you don't trust ~/.ssh/known_hosts for
	# RhostsRSAAuthentication and HostbasedAuthentication
	IgnoreUserKnownHosts no

	# To disable tunneled clear text passwords, change to no here!
	PasswordAuthentication yes
	PermitEmptyPasswords no

	# Change to no to disable s/key passwords
	#ChallengeResponseAuthentication yes

	# Kerberos options
	# KerberosAuthentication automatically enabled if keyfile exists
	KerberosAuthentication yes
	KerberosOrLocalPasswd no
	KerberosTicketCleanup yes

	# AFSTokenPassing automatically enabled if k_hasafs() is true
	AFSTokenPassing yes

	# Kerberos TGT Passing only works with the AFS kaserver
	KerberosTgtPassing yes

	# Set this to 'yes' to enable PAM keyboard-interactive authentication
	# Warning: enabling this may bypass the setting of 
'PasswordAuthentication'
	#PAMAuthenticationViaKbdInt yes

	X11Forwarding no
	X11DisplayOffset 10
	X11UseLocalhost yes
	PrintMotd yes
	PrintLastLog yes
	KeepAlive yes
	UseLogin no

	MaxStartups 10
	# no default banner path
	#Banner /some/path
	VerifyReverseMapping no

	# override default of no subsystems
	Subsystem       sftp    /usr/ssh/libexec/sftp-server
-- 
David R. Steiner                               david.r.steiner at dartmouth.edu
UNIX System Manager                            Phone:  603.646.3127
Dartmouth College                              Fax:     603.646.1041



More information about the openssh-unix-dev mailing list