Skip to content

Commit 568199b

Browse files
committed
link to another TGT rejection failure from the terrors.html file
1 parent d92f63e commit 568199b

File tree

2 files changed

+18
-9
lines changed

2 files changed

+18
-9
lines changed

sections/errors.md

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -111,6 +111,8 @@ Possible causes:
111111
1. The principal isn't in the same realm as the service, so a matching TGT cannot be found.
112112
That is: you have a TGT, it's just for the wrong realm.
113113
1. Your Active Directory tree has the same principal in more than one place in the tree.
114+
1. Your cached ticket list has been contaminated with a realmless-ticket, and the JVM is now
115+
unhappy. (See ["The Principal With No Realm"](terrors.html))
114116

115117

116118
## `Failure unspecified at GSS-API level (Mechanism level: Checksum failed)`
@@ -121,12 +123,12 @@ One of the classics
121123
to prove to the KDC that the caller has the password. If the password is wrong, so is the hash, hence
122124
an error about checksums.
123125
1. There was a keytab, but it didn't work: the JVM has fallen back to trying to log in as the user.
124-
1. Kerberos is very strict about hostnames and DNS; this can somehow trigger the problem.
125-
[http://stackoverflow.com/questions/12229658/java-spnego-unwanted-spn-canonicalization](http://stackoverflow.com/questions/12229658/java-spnego-unwanted-spn-canonicalization);
126-
1. Java 8 behaves differently from Java 6 and 7 here which can cause problems
127-
[(HADOOP-11628](https://issues.apache.org/jira/browse/HADOOP-11628).
128126
1. Your keytab contains an old version of the keytab credentials, and cannot parse the
129127
information coming from the KDC, as it lacks the up to date credentials.
128+
1. SPENGO/REST: Kerberos is very strict about hostnames and DNS; this can somehow trigger the problem.
129+
[http://stackoverflow.com/questions/12229658/java-spnego-unwanted-spn-canonicalization](http://stackoverflow.com/questions/12229658/java-spnego-unwanted-spn-canonicalization);
130+
1. SPENGO/REST: Java 8 behaves differently from Java 6 and 7 which can cause problems
131+
[HADOOP-11628](https://issues.apache.org/jira/browse/HADOOP-11628).
130132

131133

132134
## `javax.security.auth.login.LoginException: No password provided`
@@ -161,7 +163,7 @@ java.io.IOException: Could not configure server because SASL configuration did n
161163
162164
```
163165

164-
## failure to login using ticket cache file
166+
## `failure to login using ticket cache file`
165167

166168
You aren't logged via `kinit`, the application isn't configured to use a keytab. So: no ticket,
167169
no authentication, no access to cluster services.
@@ -191,7 +193,7 @@ If it's a physical cluster, make sure that your NTP daemons are pointing at the
191193

192194

193195

194-
## KDC has no support for encryption type
196+
## `KDC has no support for encryption type`
195197

196198
This crops up on the MiniKDC if you are trying to be clever about encryption types. It doesn't support many.
197199

@@ -345,7 +347,7 @@ in the client configuration, set `hadoop.security.authentication` to `kerberos`.
345347
as it shouldn't be used, this document doesn't list it.
346348

347349

348-
### `GSSException: Failure unspecified at GSS-API level (Mechanism level: Request is a replay (34))`
350+
### `Request is a replay (34))`
349351

350352
The destination thinks the caller is attempting some kind of replay attack
351353

@@ -410,7 +412,7 @@ Possible causes
410412
- A JVM/Hadoop code incompatibility stopped renewing from working.
411413
- Renewal failed for some other reason.
412414
- The client was kinited in and the token expired.
413-
415+
- Your VM clock has jumped forward and the ticket now out of date without any renewal taking place.
414416

415417

416418
## SASL `No common protection layer between client and server`

sections/secrets.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,14 +72,21 @@ This doesn't come out via Log4J, or `java.util logging;` it just comes out on th
7272
If you find yourself down at this level you are in trouble. Bear that in mind.
7373

7474

75-
###JVM SPNEGO Logging
75+
## JVM SPNEGO Logging
7676

7777
If you want to debug what is happening in SPNEGO, another system property lets you enable this:
7878

7979
```
8080
-Dsun.security.spnego.debug=true
8181
```
8282

83+
You can ask for both of these in the `HADOOP_OPTS` environment variable
84+
85+
```
86+
export HADOOP_OPTS=-Dsun.security.krb5.debug=true -Dsun.security.spnego.debug=true
87+
```
88+
89+
8390
## Hadoop-side JAAS debugging
8491

8592
Set the env variable `HADOOP_JAAS_DEBUG` to true and UGI will set the "debug" flag on any JAAS

0 commit comments

Comments
 (0)