@@ -111,6 +111,8 @@ Possible causes:
111
111
1 . The principal isn't in the same realm as the service, so a matching TGT cannot be found.
112
112
That is: you have a TGT, it's just for the wrong realm.
113
113
1 . Your Active Directory tree has the same principal in more than one place in the tree.
114
+ 1 . Your cached ticket list has been contaminated with a realmless-ticket, and the JVM is now
115
+ unhappy. (See [ "The Principal With No Realm"] ( terrors.html ) )
114
116
115
117
116
118
## ` Failure unspecified at GSS-API level (Mechanism level: Checksum failed) `
@@ -121,12 +123,12 @@ One of the classics
121
123
to prove to the KDC that the caller has the password. If the password is wrong, so is the hash, hence
122
124
an error about checksums.
123
125
1 . There was a keytab, but it didn't work: the JVM has fallen back to trying to log in as the user.
124
- 1 . Kerberos is very strict about hostnames and DNS; this can somehow trigger the problem.
125
- [ http://stackoverflow.com/questions/12229658/java-spnego-unwanted-spn-canonicalization ] ( http://stackoverflow.com/questions/12229658/java-spnego-unwanted-spn-canonicalization ) ;
126
- 1 . Java 8 behaves differently from Java 6 and 7 here which can cause problems
127
- [ (HADOOP-11628] ( https://issues.apache.org/jira/browse/HADOOP-11628 ) .
128
126
1 . Your keytab contains an old version of the keytab credentials, and cannot parse the
129
127
information coming from the KDC, as it lacks the up to date credentials.
128
+ 1 . SPENGO/REST: Kerberos is very strict about hostnames and DNS; this can somehow trigger the problem.
129
+ [ http://stackoverflow.com/questions/12229658/java-spnego-unwanted-spn-canonicalization ] ( http://stackoverflow.com/questions/12229658/java-spnego-unwanted-spn-canonicalization ) ;
130
+ 1 . SPENGO/REST: Java 8 behaves differently from Java 6 and 7 which can cause problems
131
+ [ HADOOP-11628] ( https://issues.apache.org/jira/browse/HADOOP-11628 ) .
130
132
131
133
132
134
## ` javax.security.auth.login.LoginException: No password provided `
@@ -161,7 +163,7 @@ java.io.IOException: Could not configure server because SASL configuration did n
161
163
162
164
```
163
165
164
- ## failure to login using ticket cache file
166
+ ## ` failure to login using ticket cache file `
165
167
166
168
You aren't logged via ` kinit ` , the application isn't configured to use a keytab. So: no ticket,
167
169
no authentication, no access to cluster services.
@@ -191,7 +193,7 @@ If it's a physical cluster, make sure that your NTP daemons are pointing at the
191
193
192
194
193
195
194
- ## KDC has no support for encryption type
196
+ ## ` KDC has no support for encryption type `
195
197
196
198
This crops up on the MiniKDC if you are trying to be clever about encryption types. It doesn't support many.
197
199
@@ -345,7 +347,7 @@ in the client configuration, set `hadoop.security.authentication` to `kerberos`.
345
347
as it shouldn't be used, this document doesn't list it.
346
348
347
349
348
- ### ` GSSException: Failure unspecified at GSS-API level (Mechanism level: Request is a replay (34))`
350
+ ### ` Request is a replay (34)) `
349
351
350
352
The destination thinks the caller is attempting some kind of replay attack
351
353
@@ -410,7 +412,7 @@ Possible causes
410
412
- A JVM/Hadoop code incompatibility stopped renewing from working.
411
413
- Renewal failed for some other reason.
412
414
- The client was kinited in and the token expired.
413
-
415
+ - Your VM clock has jumped forward and the ticket now out of date without any renewal taking place.
414
416
415
417
416
418
## SASL ` No common protection layer between client and server `
0 commit comments