Quantcast
Channel: Software Communities : Popular Discussions - All Things Unix
Viewing all 1046 articles
Browse latest View live

REMOTE_USER value

$
0
0
We are trying to integrate mod_auth_vas into Blackboard for user authentication.

Blackboard is a J2EE based virtual learning environment. Actually, it's a mixture of Java and Perl.

It running on Apache Tomcat and using jk connector to handle user request via Apache HTTP server (both Tomcat and Apache httpd are bundled with Blackboard).

The mod_auth_vas is installed on Blackboard bundled Apachehttpd, and after putting the server host name into IE's trusted zone.The module can recognise windows login id/password and authenticateuser against AD.

But the problem is we still have to let Blackboard pick upuser credential and pass it within its own services. Blackboardprovides a web delegation authentication module to do this. Accordingto the Tomcat error message, Blackboard is complaining about theinvalid REMOTE_USER.

The exception stack trace showing below suggests that Blackboard cannot get its expected REMOTE_USER from within the Blackboard/Tomcat/Aapche httpd (with mod_auth_vas) environment.

2007-06-28 02:47:51 - LoginBrokerServlet.service() - java.lang.RuntimeException: Invalid REMOTE_USER value.

However, the point is the Blackboard don't allow us tosee/modify the source code of their base system, so the 'stripping thedomain part' kind of things cannot be done in this way.

I was wondering whether you've got some ideas about how to get mod_auth_vas working in this situation and what REMOTE_USER value is exactly passed out from mod_auth_vas.

Thanks.

Dongyi

GSSKEX disabled: The specified target is unknown or unreachable

$
0
0
I am getting this message in the log:

GSSKEX disabled: The specified target is unknown or unreachable

when attempting to connect to a host using kerberos authentication. I am them prompted for my password every time, despite having valid credentials in the Network Identity Manager.

OS:         Windows XP SP2
PuTTy:    Quest PuTTy Release 0.60_q1.129
kfw:        NetIDMgr 1.2.0.2

I believe that the kerberos setup is OK, as I can connect to the host from my PC without entering a password if is use [url=http://www.sweb.cz/v_t_m/putty/PuTTY-0.58-GSSAPI-2005-07-24.zip] PuTTy-0.58-GSSAPI[/url] rather than Quest PuTTy. Can you suggest a solution to this problem?

In case it helps, the following is the log from one of my connections using Quest PuTTy:


=~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2008.05.06 14:07:21 =~=~=~=~=~=~=~=~=~=~=~=
Event Log: Writing new session log (SSH raw data mode) to file: C:\Documents and Settings\alfp\Desktop\PuTTy_logs\putty_06_140721_avon1.its.unimelb.edu.au.log
Event Log: Looking up host "avon1.its.unimelb.edu.au"
Event Log: Connecting to 172.22.27.82 port 22
Incoming raw data
  00000000  53 53 48 2d 31 2e 39 39 2d 4f 70 65 6e 53 53 48  SSH-1.99-OpenSSH
  00000010  5f 33 2e 39 70 31 0a                             _3.9p1.
Event Log: Server version: SSH-1.99-OpenSSH_3.9p1
Event Log: We claim version: SSH-2.0-PuTTY_Release_0.60_q1.129
Outgoing raw data
  00000000  53 53 48 2d 32 2e 30 2d 50 75 54 54 59 5f 52 65  SSH-2.0-PuTTY_Re
  00000010  6c 65 61 73 65 5f 30 2e 36 30 5f 71 31 2e 31 32  lease_0.60_q1.12
  00000020  39 0d 0a                                         9..
Event Log: SSPI: acquired credentials for: alfp@UNIMELB.EDU.AU
Event Log: Constructed service principal name 'host/avon1.its.unimelb.edu.au@ATHENA.UNIMELB.EDU.AU'
Event Log: GSSKEX disabled: The specified target is unknown or unreachable

Outgoing packet type 20 / 0x14 (SSH2_MSG_KEXINIT)
  00000000  32 a3 a5 a4 65 e5 2c b6 81 72 f7 7f e4 8d 3e 8a  2...e.,..r....>.
  00000010  00 00 00 7e 64 69 66 66 69 65 2d 68 65 6c 6c 6d  ...~diffie-hellm
  00000020  61 6e 2d 67 72 6f 75 70 2d 65 78 63 68 61 6e 67  an-group-exchang
  00000030  65 2d 73 68 61 32 35 36 2c 64 69 66 66 69 65 2d  e-sha256,diffie-
  00000040  68 65 6c 6c 6d 61 6e 2d 67 72 6f 75 70 2d 65 78  hellman-group-ex
  00000050  63 68 61 6e 67 65 2d 73 68 61 31 2c 64 69 66 66  change-sha1,diff
  00000060  69 65 2d 68 65 6c 6c 6d 61 6e 2d 67 72 6f 75 70  ie-hellman-group
  00000070  31 34 2d 73 68 61 31 2c 64 69 66 66 69 65 2d 68  14-sha1,diffie-h
  00000080  65 6c 6c 6d 61 6e 2d 67 72 6f 75 70 31 2d 73 68  ellman-group1-sh
  00000090  61 31 00 00 00 0f 73 73 68 2d 72 73 61 2c 73 73  a1....ssh-rsa,ss
  000000a0  68 2d 64 73 73 00 00 00 9f 61 65 73 32 35 36 2d  h-dss....aes256-
  000000b0  63 74 72 2c 61 65 73 32 35 36 2d 63 62 63 2c 72  ctr,aes256-cbc,r
  000000c0  69 6a 6e 64 61 65 6c 2d 63 62 63 40 6c 79 73 61  ijndael-cbc@lysa
  000000d0  74 6f 72 2e 6c 69 75 2e 73 65 2c 61 65 73 31 39  tor.liu.se,aes19
  000000e0  32 2d 63 74 72 2c 61 65 73 31 39 32 2d 63 62 63  2-ctr,aes192-cbc
  000000f0  2c 61 65 73 31 32 38 2d 63 74 72 2c 61 65 73 31  ,aes128-ctr,aes1
  00000100  32 38 2d 63 62 63 2c 62 6c 6f 77 66 69 73 68 2d  28-cbc,blowfish-
  00000110  63 74 72 2c 62 6c 6f 77 66 69 73 68 2d 63 62 63  ctr,blowfish-cbc
  00000120  2c 33 64 65 73 2d 63 74 72 2c 33 64 65 73 2d 63  ,3des-ctr,3des-c
  00000130  62 63 2c 61 72 63 66 6f 75 72 32 35 36 2c 61 72  bc,arcfour256,ar
  00000140  63 66 6f 75 72 31 32 38 00 00 00 9f 61 65 73 32  cfour128....aes2
  00000150  35 36 2d 63 74 72 2c 61 65 73 32 35 36 2d 63 62  56-ctr,aes256-cb
  00000160  63 2c 72 69 6a 6e 64 61 65 6c 2d 63 62 63 40 6c  c,rijndael-cbc@l
  00000170  79 73 61 74 6f 72 2e 6c 69 75 2e 73 65 2c 61 65  ysator.liu.se,ae
  00000180  73 31 39 32 2d 63 74 72 2c 61 65 73 31 39 32 2d  s192-ctr,aes192-
  00000190  63 62 63 2c 61 65 73 31 32 38 2d 63 74 72 2c 61  cbc,aes128-ctr,a
  000001a0  65 73 31 32 38 2d 63 62 63 2c 62 6c 6f 77 66 69  es128-cbc,blowfi
  000001b0  73 68 2d 63 74 72 2c 62 6c 6f 77 66 69 73 68 2d  sh-ctr,blowfish-
  000001c0  63 62 63 2c 33 64 65 73 2d 63 74 72 2c 33 64 65  cbc,3des-ctr,3de
  000001d0  73 2d 63 62 63 2c 61 72 63 66 6f 75 72 32 35 36  s-cbc,arcfour256
  000001e0  2c 61 72 63 66 6f 75 72 31 32 38 00 00 00 1f 68  ,arcfour128....h
  000001f0  6d 61 63 2d 73 68 61 31 2c 68 6d 61 63 2d 73 68  mac-sha1,hmac-sh
  00000200  61 31 2d 39 36 2c 68 6d 61 63 2d 6d 64 35 00 00  a1-96,hmac-md5..
  00000210  00 1f 68 6d 61 63 2d 73 68 61 31 2c 68 6d 61 63  ..hmac-sha1,hmac
  00000220  2d 73 68 61 31 2d 39 36 2c 68 6d 61 63 2d 6d 64  -sha1-96,hmac-md
  00000230  35 00 00 00 09 6e 6f 6e 65 2c 7a 6c 69 62 00 00  5....none,zlib..
  00000240  00 09 6e 6f 6e 65 2c 7a 6c 69 62 00 00 00 00 00  ..none,zlib.....
  00000250  00 00 00 00 00 00 00 00                          ........
Outgoing raw data
  00000000  00 00 02 64 0a 14 32 a3 a5 a4 65 e5 2c b6 81 72  ...d..2...e.,..r
  00000010  f7 7f e4 8d 3e 8a 00 00 00 7e 64 69 66 66 69 65  ....>....~diffie
  00000020  2d 68 65 6c 6c 6d 61 6e 2d 67 72 6f 75 70 2d 65  -hellman-group-e
  00000030  78 63 68 61 6e 67 65 2d 73 68 61 32 35 36 2c 64  xchange-sha256,d
  00000040  69 66 66 69 65 2d 68 65 6c 6c 6d 61 6e 2d 67 72  iffie-hellman-gr
  00000050  6f 75 70 2d 65 78 63 68 61 6e 67 65 2d 73 68 61  oup-exchange-sha
  00000060  31 2c 64 69 66 66 69 65 2d 68 65 6c 6c 6d 61 6e  1,diffie-hellman
  00000070  2d 67 72 6f 75 70 31 34 2d 73 68 61 31 2c 64 69  -group14-sha1,di
  00000080  66 66 69 65 2d 68 65 6c 6c 6d 61 6e 2d 67 72 6f  ffie-hellman-gro
  00000090  75 70 31 2d 73 68 61 31 00 00 00 0f 73 73 68 2d  up1-sha1....ssh-
  000000a0  72 73 61 2c 73 73 68 2d 64 73 73 00 00 00 9f 61  rsa,ssh-dss....a
  000000b0  65 73 32 35 36 2d 63 74 72 2c 61 65 73 32 35 36  es256-ctr,aes256
  000000c0  2d 63 62 63 2c 72 69 6a 6e 64 61 65 6c 2d 63 62  -cbc,rijndael-cb
  000000d0  63 40 6c 79 73 61 74 6f 72 2e 6c 69 75 2e 73 65  c@lysator.liu.se
  000000e0  2c 61 65 73 31 39 32 2d 63 74 72 2c 61 65 73 31  ,aes192-ctr,aes1
  000000f0  39 32 2d 63 62 63 2c 61 65 73 31 32 38 2d 63 74  92-cbc,aes128-ct
  00000100  72 2c 61 65 73 31 32 38 2d 63 62 63 2c 62 6c 6f  r,aes128-cbc,blo
  00000110  77 66 69 73 68 2d 63 74 72 2c 62 6c 6f 77 66 69  wfish-ctr,blowfi
  00000120  73 68 2d 63 62 63 2c 33 64 65 73 2d 63 74 72 2c  sh-cbc,3des-ctr,
  00000130  33 64 65 73 2d 63 62 63 2c 61 72 63 66 6f 75 72  3des-cbc,arcfour
  00000140  32 35 36 2c 61 72 63 66 6f 75 72 31 32 38 00 00  256,arcfour128..
  00000150  00 9f 61 65 73 32 35 36 2d 63 74 72 2c 61 65 73  ..aes256-ctr,aes
  00000160  32 35 36 2d 63 62 63 2c 72 69 6a 6e 64 61 65 6c  256-cbc,rijndael
  00000170  2d 63 62 63 40 6c 79 73 61 74 6f 72 2e 6c 69 75  -cbc@lysator.liu
  00000180  2e 73 65 2c 61 65 73 31 39 32 2d 63 74 72 2c 61  .se,aes192-ctr,a
  00000190  65 73 31 39 32 2d 63 62 63 2c 61 65 73 31 32 38  es192-cbc,aes128
  000001a0  2d 63 74 72 2c 61 65 73 31 32 38 2d 63 62 63 2c  -ctr,aes128-cbc,
  000001b0  62 6c 6f 77 66 69 73 68 2d 63 74 72 2c 62 6c 6f  blowfish-ctr,blo
  000001c0  77 66 69 73 68 2d 63 62 63 2c 33 64 65 73 2d 63  wfish-cbc,3des-c
  000001d0  74 72 2c 33 64 65 73 2d 63 62 63 2c 61 72 63 66  tr,3des-cbc,arcf
  000001e0  6f 75 72 32 35 36 2c 61 72 63 66 6f 75 72 31 32  our256,arcfour12
  000001f0  38 00 00 00 1f 68 6d 61 63 2d 73 68 61 31 2c 68  8....hmac-sha1,h
  00000200  6d 61 63 2d 73 68 61 31 2d 39 36 2c 68 6d 61 63  mac-sha1-96,hmac
  00000210  2d 6d 64 35 00 00 00 1f 68 6d 61 63 2d 73 68 61  -md5....hmac-sha
  00000220  31 2c 68 6d 61 63 2d 73 68 61 31 2d 39 36 2c 68  1,hmac-sha1-96,h
  00000230  6d 61 63 2d 6d 64 35 00 00 00 09 6e 6f 6e 65 2c  mac-md5....none,
  00000240  7a 6c 69 62 00 00 00 09 6e 6f 6e 65 2c 7a 6c 69  zlib....none,zli
  00000250  62 00 00 00 00 00 00 00 00 00 00 00 00 00 10 70  b..............p
  00000260  a9 4c 38 42 a4 a6 5a 12                          .L8B..Z.
Event Log: Using SSH protocol version 2
Incoming raw data
  00000000  00 00 02 7c 0b 14 41 b6 09 d6 0f 75 2e 3d 97 84  ...|..A....u.=..
  00000010  77 82 44 df 3c 2d 00 00 00 59 64 69 66 66 69 65  w.D.<-...Ydiffie
  00000020  2d 68 65 6c 6c 6d 61 6e 2d 67 72 6f 75 70 2d 65  -hellman-group-e
  00000030  78 63 68 61 6e 67 65 2d 73 68 61 31 2c 64 69 66  xchange-sha1,dif
  00000040  66 69 65 2d 68 65 6c 6c 6d 61 6e 2d 67 72 6f 75  fie-hellman-grou
  00000050  70 31 34 2d 73 68 61 31 2c 64 69 66 66 69 65 2d  p14-sha1,diffie-
  00000060  68 65 6c 6c 6d 61 6e 2d 67 72 6f 75 70 31 2d 73  hellman-group1-s
  00000070  68 61 31 00 00 00 0f 73 73 68 2d 72 73 61 2c 73  ha1....ssh-rsa,s
  00000080  73 68 2d 64 73 73 00 00 00 87 61 65 73 31 32 38  sh-dss....aes128
  00000090  2d 63 62 63 2c 33 64 65 73 2d 63 62 63 2c 62 6c  -cbc,3des-cbc,bl
  000000a0  6f 77 66 69 73 68 2d 63 62 63 2c 63 61 73 74 31  owfish-cbc,cast1
  000000b0  32 38 2d 63 62 63 2c 61 72 63 66 6f 75 72 2c 61  28-cbc,arcfour,a
  000000c0  65 73 31 39 32 2d 63 62 63 2c 61 65 73 32 35 36  es192-cbc,aes256
  000000d0  2d 63 62 63 2c 72 69 6a 6e 64 61 65 6c 2d 63 62  -cbc,rijndael-cb
  000000e0  63 40 6c 79 73 61 74 6f 72 2e 6c 69 75 2e 73 65  c@lysator.liu.se
  000000f0  2c 61 65 73 31 32 38 2d 63 74 72 2c 61 65 73 31  ,aes128-ctr,aes1
  00000100  39 32 2d 63 74 72 2c 61 65 73 32 35 36 2d 63 74  92-ctr,aes256-ct
  00000110  72 00 00 00 87 61 65 73 31 32 38 2d 63 62 63 2c  r....aes128-cbc,
  00000120  33 64 65 73 2d 63 62 63 2c 62 6c 6f 77 66 69 73  3des-cbc,blowfis
  00000130  68 2d 63 62 63 2c 63 61 73 74 31 32 38 2d 63 62  h-cbc,cast128-cb
  00000140  63 2c 61 72 63 66 6f 75 72 2c 61 65 73 31 39 32  c,arcfour,aes192
  00000150  2d 63 62 63 2c 61 65 73 32 35 36 2d 63 62 63 2c  -cbc,aes256-cbc,
  00000160  72 69 6a 6e 64 61 65 6c 2d 63 62 63 40 6c 79 73  rijndael-cbc@lys
  00000170  61 74 6f 72 2e 6c 69 75 2e 73 65 2c 61 65 73 31  ator.liu.se,aes1
  00000180  32 38 2d 63 74 72 2c 61 65 73 31 39 32 2d 63 74  28-ctr,aes192-ct
  00000190  72 2c 61 65 73 32 35 36 2d 63 74 72 00 00 00 55  r,aes256-ctr...U
  000001a0  68 6d 61 63 2d 6d 64 35 2c 68 6d 61 63 2d 73 68  hmac-md5,hmac-sh
  000001b0  61 31 2c 68 6d 61 63 2d 72 69 70 65 6d 64 31 36  a1,hmac-ripemd16
  000001c0  30 2c 68 6d 61 63 2d 72 69 70 65 6d 64 31 36 30  0,hmac-ripemd160
  000001d0  40 6f 70 65 6e 73 73 68 2e 63 6f 6d 2c 68 6d 61  @openssh.com,hma
  000001e0  63 2d 73 68 61 31 2d 39 36 2c 68 6d 61 63 2d 6d  c-sha1-96,hmac-m
  000001f0  64 35 2d 39 36 00 00 00 55 68 6d 61 63 2d 6d 64  d5-96...Uhmac-md
  00000200  35 2c 68 6d 61 63 2d 73 68 61 31 2c 68 6d 61 63  5,hmac-sha1,hmac
  00000210  2d 72 69 70 65 6d 64 31 36 30 2c 68 6d 61 63 2d  -ripemd160,hmac-
  00000220  72 69 70 65 6d 64 31 36 30 40 6f 70 65 6e 73 73  ripemd160@openss
  00000230  68 2e 63 6f 6d 2c 68 6d 61 63 2d 73 68 61 31 2d  h.com,hmac-sha1-
  00000240  39 36 2c 68 6d 61 63 2d 6d 64 35 2d 39 36 00 00  96,hmac-md5-96..
  00000250  00 09 6e 6f 6e 65 2c 7a 6c 69 62 00 00 00 09 6e  ..none,zlib....n
  00000260  6f 6e 65 2c 7a 6c 69 62 00 00 00 00 00 00 00 00  one,zlib........
  00000270  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
Incoming packet type 20 / 0x14 (SSH2_MSG_KEXINIT)
  00000000  41 b6 09 d6 0f 75 2e 3d 97 84 77 82 44 df 3c 2d  A....u.=..w.D.<-
  00000010  00 00 00 59 64 69 66 66 69 65 2d 68 65 6c 6c 6d  ...Ydiffie-hellm
  00000020  61 6e 2d 67 72 6f 75 70 2d 65 78 63 68 61 6e 67  an-group-exchang
  00000030  65 2d 73 68 61 31 2c 64 69 66 66 69 65 2d 68 65  e-sha1,diffie-he
  00000040  6c 6c 6d 61 6e 2d 67 72 6f 75 70 31 34 2d 73 68  llman-group14-sh
  00000050  61 31 2c 64 69 66 66 69 65 2d 68 65 6c 6c 6d 61  a1,diffie-hellma
  00000060  6e 2d 67 72 6f 75 70 31 2d 73 68 61 31 00 00 00  n-group1-sha1...
  00000070  0f 73 73 68 2d 72 73 61 2c 73 73 68 2d 64 73 73  .ssh-rsa,ssh-dss
  00000080  00 00 00 87 61 65 73 31 32 38 2d 63 62 63 2c 33  ....aes128-cbc,3
  00000090  64 65 73 2d 63 62 63 2c 62 6c 6f 77 66 69 73 68  des-cbc,blowfish
  000000a0  2d 63 62 63 2c 63 61 73 74 31 32 38 2d 63 62 63  -cbc,cast128-cbc
  000000b0  2c 61 72 63 66 6f 75 72 2c 61 65 73 31 39 32 2d  ,arcfour,aes192-
  000000c0  63 62 63 2c 61 65 73 32 35 36 2d 63 62 63 2c 72  cbc,aes256-cbc,r
  000000d0  69 6a 6e 64 61 65 6c 2d 63 62 63 40 6c 79 73 61  ijndael-cbc@lysa
  000000e0  74 6f 72 2e 6c 69 75 2e 73 65 2c 61 65 73 31 32  tor.liu.se,aes12
  000000f0  38 2d 63 74 72 2c 61 65 73 31 39 32 2d 63 74 72  8-ctr,aes192-ctr
  00000100  2c 61 65 73 32 35 36 2d 63 74 72 00 00 00 87 61  ,aes256-ctr....a
  00000110  65 73 31 32 38 2d 63 62 63 2c 33 64 65 73 2d 63  es128-cbc,3des-c
  00000120  62 63 2c 62 6c 6f 77 66 69 73 68 2d 63 62 63 2c  bc,blowfish-cbc,
  00000130  63 61 73 74 31 32 38 2d 63 62 63 2c 61 72 63 66  cast128-cbc,arcf
  00000140  6f 75 72 2c 61 65 73 31 39 32 2d 63 62 63 2c 61  our,aes192-cbc,a
  00000150  65 73 32 35 36 2d 63 62 63 2c 72 69 6a 6e 64 61  es256-cbc,rijnda
  00000160  65 6c 2d 63 62 63 40 6c 79 73 61 74 6f 72 2e 6c  el-cbc@lysator.l
  00000170  69 75 2e 73 65 2c 61 65 73 31 32 38 2d 63 74 72  iu.se,aes128-ctr
  00000180  2c 61 65 73 31 39 32 2d 63 74 72 2c 61 65 73 32  ,aes192-ctr,aes2
  00000190  35 36 2d 63 74 72 00 00 00 55 68 6d 61 63 2d 6d  56-ctr...Uhmac-m
  000001a0  64 35 2c 68 6d 61 63 2d 73 68 61 31 2c 68 6d 61  d5,hmac-sha1,hma
  000001b0  63 2d 72 69 70 65 6d 64 31 36 30 2c 68 6d 61 63  c-ripemd160,hmac
  000001c0  2d 72 69 70 65 6d 64 31 36 30 40 6f 70 65 6e 73  -ripemd160@opens
  000001d0  73 68 2e 63 6f 6d 2c 68 6d 61 63 2d 73 68 61 31  sh.com,hmac-sha1
  000001e0  2d 39 36 2c 68 6d 61 63 2d 6d 64 35 2d 39 36 00  -96,hmac-md5-96.
  000001f0  00 00 55 68 6d 61 63 2d 6d 64 35 2c 68 6d 61 63  ..Uhmac-md5,hmac
  00000200  2d 73 68 61 31 2c 68 6d 61 63 2d 72 69 70 65 6d  -sha1,hmac-ripem
  00000210  64 31 36 30 2c 68 6d 61 63 2d 72 69 70 65 6d 64  d160,hmac-ripemd
  00000220  31 36 30 40 6f 70 65 6e 73 73 68 2e 63 6f 6d 2c  160@openssh.com,
  00000230  68 6d 61 63 2d 73 68 61 31 2d 39 36 2c 68 6d 61  hmac-sha1-96,hma
  00000240  63 2d 6d 64 35 2d 39 36 00 00 00 09 6e 6f 6e 65  c-md5-96....none
  00000250  2c 7a 6c 69 62 00 00 00 09 6e 6f 6e 65 2c 7a 6c  ,zlib....none,zl
  00000260  69 62 00 00 00 00 00 00 00 00 00 00 00 00 00     ib.............
Event Log: Doing Diffie-Hellman group exchange
Outgoing packet type 30 / 0x1e (SSH2_MSG_KEX_DH_GEX_REQUEST)
  00000000  00 00 08 00                                      ....
Outgoing raw data
  00000000  00 00 00 0c 06 1e 00 00 08 00 e2 09 58 12 ad d9  ............X...
Incoming raw data
  00000000  00 00 01 14 08 1f 00 00 01 01 00 ee fd 0d f9 b6  ................
  00000010  0c bf 61 dd ba 33 64 f8 b6 25 42 56 fc 2d f3 21  ..a..3d..%BV.-.!
  00000020  1b 1d 80 f4 55 68 16 c5 d6 29 b0 a4 02 28 86 1b  ....Uh...)...(..
  00000030  ee 7b 44 97 44 4d d9 37 5e f7 e8 99 7b b7 29 4c  .{D.DM.7^...{.)L
  00000040  6a a0 97 a1 e5 ad 47 db 72 c1 49 56 89 8f d1 1c  j.....G.r.IV....
  00000050  a2 92 ed 76 21 5e 09 d8 06 78 35 15 09 28 d5 f0  ...v!^...x5..(..
  00000060  92 67 b2 92 14 15 9c 0c b6 95 ee cc 90 e0 5c 0e  .g............\.
  00000070  21 37 4e d6 f0 47 59 b3 f0 e1 62 ee 2c fb c8 25  !7N..GY...b.,..%
  00000080  9b c1 a1 f2 8c 80 97 00 e1 f3 ec ba 24 a9 9a 78  ............$..x
  00000090  bc cc 6e 77 63 48 70 58 37 f8 6a 2b 4a 34 db 59  ..nwcHpX7.j+J4.Y
  000000a0  27 53 46 89 05 17 98 02 78 8f 52 c3 37 e0 18 7f  'SF.....x.R.7...
  000000b0  69 c3 0d 52 c9 95 46 29 0d 09 15 4e af ee 72 f9  i..R..F)...N..r.
  000000c0  ca 32 a9 89 aa 45 ad 68 22 05 39 a6 aa 30 2a ea  .2...E.h".9..0*.
  000000d0  4d cc ce 7e 6f cf 6d ee 57 44 0a 45 11 b4 ba f5  M..~o.m.WD.E....
  000000e0  b4 83 2d 27 24 7f de d2 31 16 84 13 b1 2a 0e 11  ..-'$...1....*..
  000000f0  47 a5 70 6c 56 23 87 88 a7 70 74 63 45 2e 12 54  G.plV#...ptcE..T
  00000100  f2 50 3b a1 97 75 6f 1e 31 27 ab 00 00 00 01 02  .P;..uo.1'......
  00000110  00 00 00 00 00 00 00 00                          ........
Incoming packet type 31 / 0x1f (SSH2_MSG_KEX_DH_GEX_GROUP)
  00000000  00 00 01 01 00 ee fd 0d f9 b6 0c bf 61 dd ba 33  ............a..3
  00000010  64 f8 b6 25 42 56 fc 2d f3 21 1b 1d 80 f4 55 68  d..%BV.-.!....Uh
  00000020  16 c5 d6 29 b0 a4 02 28 86 1b ee 7b 44 97 44 4d  ...)...(...{D.DM
  00000030  d9 37 5e f7 e8 99 7b b7 29 4c 6a a0 97 a1 e5 ad  .7^...{.)Lj.....
  00000040  47 db 72 c1 49 56 89 8f d1 1c a2 92 ed 76 21 5e  G.r.IV.......v!^
  00000050  09 d8 06 78 35 15 09 28 d5 f0 92 67 b2 92 14 15  ...x5..(...g....
  00000060  9c 0c b6 95 ee cc 90 e0 5c 0e 21 37 4e d6 f0 47  ........\.!7N..G
  00000070  59 b3 f0 e1 62 ee 2c fb c8 25 9b c1 a1 f2 8c 80  Y...b.,..%......
  00000080  97 00 e1 f3 ec ba 24 a9 9a 78 bc cc 6e 77 63 48  ......$..x..nwcH
  00000090  70 58 37 f8 6a 2b 4a 34 db 59 27 53 46 89 05 17  pX7.j+J4.Y'SF...
  000000a0  98 02 78 8f 52 c3 37 e0 18 7f 69 c3 0d 52 c9 95  ..x.R.7...i..R..
  000000b0  46 29 0d 09 15 4e af ee 72 f9 ca 32 a9 89 aa 45  F)...N..r..2...E
  000000c0  ad 68 22 05 39 a6 aa 30 2a ea 4d cc ce 7e 6f cf  .h".9..0*.M..~o.
  000000d0  6d ee 57 44 0a 45 11 b4 ba f5 b4 83 2d 27 24 7f  m.WD.E......-'$.
  000000e0  de d2 31 16 84 13 b1 2a 0e 11 47 a5 70 6c 56 23  ..1....*..G.plV#
  000000f0  87 88 a7 70 74 63 45 2e 12 54 f2 50 3b a1 97 75  ...ptcE..T.P;..u
  00000100  6f 1e 31 27 ab 00 00 00 01 02                    o.1'......
Event Log: Doing Diffie-Hellman key exchange with hash SHA-1
Outgoing packet type 32 / 0x20 (SSH2_MSG_KEX_DH_GEX_INIT)
  00000000  00 00 01 01 00 92 3f 2d 2e 88 1a 6a f7 17 b7 ca  ......?-...j....
  00000010  93 7f 78 7c 05 a5 c8 ff 0b dd 62 83 59 f9 29 12  ..x|......b.Y.).
  00000020  50 20 fb 86 42 ef 0f 7a 79 09 36 d0 ca 74 a8 e2  P ..B..zy.6..t..
  00000030  a0 4d a8 1c 55 aa c3 e3 df 0c ce 89 af 56 cf a6  .M..U........V..
  00000040  b1 8c 79 46 a8 29 72 9d e1 ae 82 75 22 79 75 5b  ..yF.)r....u"yu[
  00000050  de a7 af 34 dd a7 8a 3f ed 07 4d 44 60 95 3a e6  ...4...?..MD`.:.
  00000060  2b 1c ab bd 05 53 95 d3 8e b1 5d 78 11 f2 a9 6b  +....S....]x...k
  00000070  13 26 08 9b 36 2b 2b 33 51 ef 8a f3 06 47 72 b7  .&..6++3Q....Gr.
  00000080  8a 27 81 a2 4a e2 68 e2 58 c8 f3 ad 89 60 03 55  .'..J.h.X....`.U
  00000090  1d 5e 18 02 9b f8 e6 7f d6 02 08 95 d3 c7 ac f3  .^..............
  000000a0  4f 57 90 03 5b a8 02 30 c7 eb 63 ad cc 85 75 57  OW..[..0..c...uW
  000000b0  a0 a2 fc b8 11 3f 7c 3a b2 dd d1 15 2b 0d 82 01  .....?|:....+...
  000000c0  71 f0 4c 14 3c 4f 10 e1 3e 76 ce ae 4d 66 99 98  q.L.<O..>v..Mf..
  000000d0  65 54 bd 56 40 1e a4 66 9f fa ea bc f6 37 32 1e  eT.V@..f.....72.
  000000e0  6f a4 ca 3c eb e8 2b db d3 c3 40 81 fc 4c 15 b6  o..<..+...@..L..
  000000f0  5b 2b e9 b0 6d db ef b7 f3 3f ee 8b a4 67 9b 92  [+..m....?...g..
  00000100  e2 98 13 96 25                                   ....%
Outgoing raw data
  00000000  00 00 01 0c 05 20 00 00 01 01 00 92 3f 2d 2e 88  ..... ......?-..
  00000010  1a 6a f7 17 b7 ca 93 7f 78 7c 05 a5 c8 ff 0b dd  .j......x|......
  00000020  62 83 59 f9 29 12 50 20 fb 86 42 ef 0f 7a 79 09  b.Y.).P ..B..zy.
  00000030  36 d0 ca 74 a8 e2 a0 4d a8 1c 55 aa c3 e3 df 0c  6..t...M..U.....
  00000040  ce 89 af 56 cf a6 b1 8c 79 46 a8 29 72 9d e1 ae  ...V....yF.)r...
  00000050  82 75 22 79 75 5b de a7 af 34 dd a7 8a 3f ed 07  .u"yu[...4...?..
  00000060  4d 44 60 95 3a e6 2b 1c ab bd 05 53 95 d3 8e b1  MD`.:.+....S....
  00000070  5d 78 11 f2 a9 6b 13 26 08 9b 36 2b 2b 33 51 ef  ]x...k.&..6++3Q.
  00000080  8a f3 06 47 72 b7 8a 27 81 a2 4a e2 68 e2 58 c8  ...Gr..'..J.h.X.
  00000090  f3 ad 89 60 03 55 1d 5e 18 02 9b f8 e6 7f d6 02  ...`.U.^........
  000000a0  08 95 d3 c7 ac f3 4f 57 90 03 5b a8 02 30 c7 eb  ......OW..[..0..
  000000b0  63 ad cc 85 75 57 a0 a2 fc b8 11 3f 7c 3a b2 dd  c...uW.....?|:..
  000000c0  d1 15 2b 0d 82 01 71 f0 4c 14 3c 4f 10 e1 3e 76  ..+...q.L.<O..>v
  000000d0  ce ae 4d 66 99 98 65 54 bd 56 40 1e a4 66 9f fa  ..Mf..eT.V@..f..
  000000e0  ea bc f6 37 32 1e 6f a4 ca 3c eb e8 2b db d3 c3  ...72.o..<..+...
  000000f0  40 81 fc 4c 15 b6 5b 2b e9 b0 6d db ef b7 f3 3f  @..L..[+..m....?
  00000100  ee 8b a4 67 9b 92 e2 98 13 96 25 21 fa 5d 06 9f  ...g......%!.]..
Incoming raw data
  00000000  00 00 02 3c 09 21 00 00 00 95 00 00 00 07 73 73  ...<.!........ss
  00000010  68 2d 72 73 61 00 00 00 01 23 00 00 00 81 00 c3  h-rsa....#......
  00000020  50 4c 96 18 1c 84 38 8e 0d 58 57 e0 b7 16 e6 6e  PL....8..XW....n
  00000030  41 bd d7 e5 57 ce 2d d0 8e 88 51 4e 66 7d 27 66  A...W.-...QNf}'f
  00000040  b0 3f b5 a9 26 ef 49 34 c9 78 f8 5f 21 61 5f 54  .?..&.I4.x._!a_T
  00000050  44 5d 0b 2f 6b 0f d2 fc 04 3d e4 fa b4 55 66 bb  D]./k....=...Uf.
  00000060  aa b9 ef 0f be 14 b0 12 80 be 1a 6f e7 35 d1 f6  ...........o.5..
  00000070  61 54 9d 95 b1 83 03 14 a8 aa 41 6a e7 78 fa 06  aT........Aj.x..
  00000080  72 c5 cb 2c d0 e4 7d 7e dc ce c6 8e e0 ca e5 de  r..,..}~........
  00000090  ce 50 51 86 27 c2 48 fa 37 be e3 cc d1 a3 5f 00  .PQ.'.H.7....._.
  000000a0  00 01 01 00 82 00 89 ab 6d 3a a6 84 bc aa 04 a6  ........m:......
  000000b0  22 5b cf 0f d1 ff 70 f8 7e af 7a 7f 46 3c ff 60  "[....p.~.z.F<.`
  000000c0  86 1b ba b7 7d 56 4b ce 59 4c 81 05 92 cd 3d 79  ....}VK.YL....=y
  000000d0  27 27 a7 01 79 ae 51 a8 f7 73 fc ef 33 3c 1f 90  ''..y.Q..s..3<..
  000000e0  1e dd eb 39 2d c1 4c 20 67 d1 a7 2a 0d f9 58 b8  ...9-.L g..*..X.
  000000f0  d2 34 bc 84 cf 8d 44 ea 28 22 78 c2 f4 89 8c 1e  .4....D.("x.....
  00000100  bd 18 58 55 1d 27 0f 27 e1 cc 60 49 06 85 b8 01  ..XU.'.'..`I....
  00000110  fb 8b d9 bd 3a 74 29 84 61 e1 88 d3 ec f8 0d 7c  ....:t).a......|
  00000120  68 6c f2 64 53 27 5d a5 01 bc 22 c6 6b a6 b7 0c  hl.dS']...".k...
  00000130  7b 2a 00 54 d0 a6 61 d4 19 ff eb 8e 92 0a 4d 31  {*.T..a.......M1
  00000140  5c 73 d5 cc 0c 1b 88 84 06 c8 f5 a6 22 06 f9 5b  \s.........."..[
  00000150  d5 f3 c9 5a b9 3f 48 00 a9 05 9a 3e 08 b0 de 48  ...Z.?H....>...H
  00000160  7c 90 fc 2d 52 a0 d9 bc 5c 57 2b 01 b5 6c 40 ca  |..-R...\W+..l@.
  00000170  ff 90 76 f7 ce 35 52 fa cc 4b 3c 78 db 45 4a 0e  ..v..5R..K<x.EJ.
  00000180  9d 0e 37 58 ae 65 80 67 17 78 51 d7 63 53 b3 c0  ..7X.e.g.xQ.cS..
  00000190  e7 1c 62 7c 00 c4 8b ca 32 4b e0 52 39 25 07 a7  ..b|....2K.R9%..
  000001a0  58 38 39 0c 00 00 00 8f 00 00 00 07 73 73 68 2d  X89.........ssh-
  000001b0  72 73 61 00 00 00 80 10 2f 0c c8 7d c1 8b 46 53  rsa...../..}..FS
  000001c0  e8 d4 45 05 cf 0a 37 81 1a 79 b8 89 7c 8c f0 c3  ..E...7..y..|...
  000001d0  57 d8 5e 66 fa f4 ea ca c8 c2 a1 35 b8 2c 4d 25  W.^f.......5.,M%
  000001e0  ec f4 ec 03 ee fd 40 ca 70 13 8b df d6 3b a2 52  ......@.p....;.R
  000001f0  6f 47 04 c5 9a 30 a5 0f 93 06 90 71 08 80 ea 9c  oG...0.....q....
  00000200  95 d9 90 ac 02 80 99 31 f2 c9 c2 9c 92 4a df 3a  .......1.....J.:
  00000210  01 69 fa 2f 42 bd cb 97 87 b4 bf c7 2d 9e b4 c8  .i./B.......-...
  00000220  26 53 1a 04 09 b6 e8 37 22 ae a3 c8 ee 62 8d 47  &S.....7"....b.G
  00000230  98 13 55 e9 fb 87 de 00 00 00 00 00 00 00 00 00  ..U.............
  00000240  00 00 00 0c 0a 15 00 00 00 00 00 00 00 00 00 00  ................
Incoming packet type 33 / 0x21 (SSH2_MSG_KEX_DH_GEX_REPLY)
  00000000  00 00 00 95 00 00 00 07 73 73 68 2d 72 73 61 00  ........ssh-rsa.
  00000010  00 00 01 23 00 00 00 81 00 c3 50 4c 96 18 1c 84  ...#......PL....
  00000020  38 8e 0d 58 57 e0 b7 16 e6 6e 41 bd d7 e5 57 ce  8..XW....nA...W.
  00000030  2d d0 8e 88 51 4e 66 7d 27 66 b0 3f b5 a9 26 ef  -...QNf}'f.?..&.
  00000040  49 34 c9 78 f8 5f 21 61 5f 54 44 5d 0b 2f 6b 0f  I4.x._!a_TD]./k.
  00000050  d2 fc 04 3d e4 fa b4 55 66 bb aa b9 ef 0f be 14  ...=...Uf.......
  00000060  b0 12 80 be 1a 6f e7 35 d1 f6 61 54 9d 95 b1 83  .....o.5..aT....
  00000070  03 14 a8 aa 41 6a e7 78 fa 06 72 c5 cb 2c d0 e4  ....Aj.x..r..,..
  00000080  7d 7e dc ce c6 8e e0 ca e5 de ce 50 51 86 27 c2  }~.........PQ.'.
  00000090  48 fa 37 be e3 cc d1 a3 5f 00 00 01 01 00 82 00  H.7....._.......
  000000a0  89 ab 6d 3a a6 84 bc aa 04 a6 22 5b cf 0f d1 ff  ..m:......"[....
  000000b0  70 f8 7e af 7a 7f 46 3c ff 60 86 1b ba b7 7d 56  p.~.z.F<.`....}V
  000000c0  4b ce 59 4c 81 05 92 cd 3d 79 27 27 a7 01 79 ae  K.YL....=y''..y.
  000000d0  51 a8 f7 73 fc ef 33 3c 1f 90 1e dd eb 39 2d c1  Q..s..3<.....9-.
  000000e0  4c 20 67 d1 a7 2a 0d f9 58 b8 d2 34 bc 84 cf 8d  L g..*..X..4....
  000000f0  44 ea 28 22 78 c2 f4 89 8c 1e bd 18 58 55 1d 27  D.("x.......XU.'
  00000100  0f 27 e1 cc 60 49 06 85 b8 01 fb 8b d9 bd 3a 74  .'..`I........:t
  00000110  29 84 61 e1 88 d3 ec f8 0d 7c 68 6c f2 64 53 27  ).a......|hl.dS'
  00000120  5d a5 01 bc 22 c6 6b a6 b7 0c 7b 2a 00 54 d0 a6  ]...".k...{*.T..
  00000130  61 d4 19 ff eb 8e 92 0a 4d 31 5c 73 d5 cc 0c 1b  a.......M1\s....
  00000140  88 84 06 c8 f5 a6 22 06 f9 5b d5 f3 c9 5a b9 3f  ......"..[...Z.?
  00000150  48 00 a9 05 9a 3e 08 b0 de 48 7c 90 fc 2d 52 a0  H....>...H|..-R.
  00000160  d9 bc 5c 57 2b 01 b5 6c 40 ca ff 90 76 f7 ce 35  ..\W+..l@...v..5
  00000170  52 fa cc 4b 3c 78 db 45 4a 0e 9d 0e 37 58 ae 65  R..K<x.EJ...7X.e
  00000180  80 67 17 78 51 d7 63 53 b3 c0 e7 1c 62 7c 00 c4  .g.xQ.cS....b|..
  00000190  8b ca 32 4b e0 52 39 25 07 a7 58 38 39 0c 00 00  ..2K.R9%..X89...
  000001a0  00 8f 00 00 00 07 73 73 68 2d 72 73 61 00 00 00  ......ssh-rsa...
  000001b0  80 10 2f 0c c8 7d c1 8b 46 53 e8 d4 45 05 cf 0a  ../..}..FS..E...
  000001c0  37 81 1a 79 b8 89 7c 8c f0 c3 57 d8 5e 66 fa f4  7..y..|...W.^f..
  000001d0  ea ca c8 c2 a1 35 b8 2c 4d 25 ec f4 ec 03 ee fd  .....5.,M%......
  000001e0  40 ca 70 13 8b df d6 3b a2 52 6f 47 04 c5 9a 30  @.p....;.RoG...0
  000001f0  a5 0f 93 06 90 71 08 80 ea 9c 95 d9 90 ac 02 80  .....q..........
  00000200  99 31 f2 c9 c2 9c 92 4a df 3a 01 69 fa 2f 42 bd  .1.....J.:.i./B.
  00000210  cb 97 87 b4 bf c7 2d 9e b4 c8 26 53 1a 04 09 b6  ......-...&S....
  00000220  e8 37 22 ae a3 c8 ee 62 8d 47 98 13 55 e9 fb 87  .7"....b.G..U...
  00000230  de                                               .
Event Log: Host key fingerprint is:
Event Log: ssh-rsa 1024 52:85:41:3c:eb:3f:13:58:d3:71:dc:e7:57:c0:3e:01
Outgoing packet type 21 / 0x15 (SSH2_MSG_NEWKEYS)
Outgoing raw data
  00000000  00 00 00 0c 0a 15 c2 2e d2 48 15 62 e8 dd 7b 79  .........H.b..{y
Event Log: Initialised AES-256 SDCTR client->server encryption
Event Log: Initialised HMAC-SHA1 client->server MAC algorithm
Outgoing raw data
Incoming packet type 21 / 0x15 (SSH2_MSG_NEWKEYS)
Event Log: Initialised AES-256 SDCTR server->client encryption
Event Log: Initialised HMAC-SHA1 server->client MAC algorithm
Outgoing packet type 5 / 0x05 (SSH2_MSG_SERVICE_REQUEST)
  00000000  00 00 00 0c 73 73 68 2d 75 73 65 72 61 75 74 68  ....ssh-userauth
Outgoing raw data
  00000000  f1 52 1e a8 c5 83 75 3e a3 40 47 f7 27 20 4f 2d  .R....u>.@G.' O-
  00000010  7f a0 32 17 35 93 8a 9c de 45 dd 13 7f d9 ab 23  ..2.5....E.....#
  00000020  89 f0 8e 74 a9 20 c1 55 7e 4c b7 53 69 6d f3 cf  ...t. .U~L.Sim..
  00000030  a0 a5 9b 3b                                      ...;
Incoming raw data
  00000000  1c 7e 8a 60 37 c4 15 3b 37 fa e0 7b d1 d9 03 74  .~.`7..;7..{...t
  00000010  fe 44 8c a7 96 33 35 0d 6d 37 57 64 95 ff a4 45  .D...35.m7Wd...E
  00000020  49 86 7a ee 3a 10 52 f5 ac 08 4b 0c eb bf 33 9d  I.z.:.R...K...3.
  00000030  e2 78 4d 2a                                      .xM*
Incoming packet type 6 / 0x06 (SSH2_MSG_SERVICE_ACCEPT)
  00000000  00 00 00 0c 73 73 68 2d 75 73 65 72 61 75 74 68  ....ssh-userauth
Outgoing packet type 50 / 0x32 (SSH2_MSG_USERAUTH_REQUEST)
  00000000  00 00 00 04 61 6c 66 70 00 00 00 0e 73 73 68 2d  ....alfp....ssh-
  00000010  63 6f 6e 6e 65 63 74 69 6f 6e 00 00 00 04 6e 6f  connection....no
  00000020  6e 65                                            ne
Outgoing raw data
  00000000  55 ce 59 f1 01 71 c0 ee f4 8f 43 be 6c 96 ea de  U.Y..q....C.l...
  00000010  cb 83 93 55 90 f9 e2 19 5a 6c 7d 52 ad cd 61 5a  ...U....Zl}R..aZ
  00000020  4f 90 e7 10 ca ec 0e f1 d4 9f 7f 09 c8 c1 be fe  O...............
  00000030  b2 1b 2e 47 39 3d 89 ab 3d b2 84 37 49 3b 68 cf  ...G9=..=..7I;h.
  00000040  e6 31 a5 5a                                      .1.Z
Incoming raw data
  00000000  6b 10 ac 13 86 6f 97 4f 4f 5f 63 03 6a 5c 45 05  k....o.OO_c.j\E.
  00000010  d3 98 39 6a 95 02 b7 93 4b d4 70 14 45 c4 b3 78  ..9j....K.p.E..x
  00000020  88 cf 63 2b 8d 4c 40 73 ee 2e 15 a0 48 c5 80 de  ..c+.L@s....H...
  00000030  e7 bc 53 87 c7 d9 10 02 23 c1 74 af b2 12 ae e8  ..S.....#.t.....
  00000040  83 84 14 13 19 ef a5 57 9e e7 5d 7b 37 16 1a 1d  .......W..]{7...
  00000050  66 b8 08 2e                                      f...
Incoming packet type 51 / 0x33 (SSH2_MSG_USERAUTH_FAILURE)
  00000000  00 00 00 22 70 75 62 6c 69 63 6b 65 79 2c 67 73  ..."publickey,gs
  00000010  73 61 70 69 2d 77 69 74 68 2d 6d 69 63 2c 70 61  sapi-with-mic,pa
  00000020  73 73 77 6f 72 64 00                             ssword.
Event Log: SSPI: trying user_name='alfp' service=''
Event Log: SSPI: acquired credentials for: alfp@UNIMELB.EDU.AU
Event Log: Constructed service principal name 'host/avon1.its.unimelb.edu.au@ATHENA.UNIMELB.EDU.AU'
Outgoing packet type 50 / 0x32 (SSH2_MSG_USERAUTH_REQUEST)
  00000000  00 00 00 04 61 6c 66 70 00 00 00 0e 73 73 68 2d  ....alfp....ssh-
  00000010  63 6f 6e 6e 65 63 74 69 6f 6e 00 00 00 0f 67 73  connection....gs
  00000020  73 61 70 69 2d 77 69 74 68 2d 6d 69 63 00 00 00  sapi-with-mic...
  00000030  01 00 00 00 0b 06 09 2a 86 48 86 f7 12 01 02 02  .......*.H......
Outgoing raw data
  00000000  08 c8 1b 8b db 2d 0d f5 fa a1 6b 60 b3 af 2a 33  .....-....k`..*3
  00000010  24 a3 73 3b 1c 61 f0 cb c2 6c 0f c2 60 9f ae 63  $.s;.a...l..`..c
  00000020  ac c1 19 b6 9e 31 d4 59 4a 5c 5c 5e 3e 75 3b 9e  .....1.YJ\\^>u;.
  00000030  ad 03 f4 05 aa 9b b2 e5 c8 ce c5 ba 08 90 f6 58  ...............X
  00000040  fd 1d 42 c5 6a 61 fe ca 3e 7c bc 7e 1a 59 03 44  ..B.ja..>|.~.Y.D
  00000050  e3 51 f6 02 f3 e1 37 99 d4 f1 56 44 2d af 26 f3  .Q....7...VD-.&.
  00000060  5b 41 21 6e                                      [A!n
Incoming raw data
  00000000  53 47 fe d1 f7 71 62 3b a6 c6 d3 0d 78 4a 5b 47  SG...qb;....xJ[G
  00000010  a7 8b f1 c0 7c 06 fe 30 06 cc 14 8c 3f 49 e5 20  ....|..0....?I.
  00000020  c9 85 3b 01 43 52 b3 f2 84 2f 62 98 f1 51 5c 15  ..;.CR.../b..Q\.
  00000030  d5 a2 51 62                                      ..Qb
Incoming packet type 60 / 0x3c (SSH2_MSG_USERAUTH_GSSAPI_RESPONSE)
  00000000  00 00 00 0b 06 09 2a 86 48 86 f7 12 01 02 02     ......*.H......
Event Log: InitializeSecurityContext: The specified target is unknown or unreachable

Event Log: GSSAPI authentication aborted
Outgoing packet type 50 / 0x32 (SSH2_MSG_USERAUTH_REQUEST)
  00000000  00 00 00 04 61 6c 66 70 00 00 00 0e 73 73 68 2d  ....alfp....ssh-
  00000010  63 6f 6e 6e 65 63 74 69 6f 6e 00 00 00 04 6e 6f  connection....no
  00000020  6e 65                                            ne
Outgoing raw data
  00000000  4c 2e d9 2b f6 4e e6 71 58 13 41 58 dc f4 5e ac  L..+.N.qX.AX..^.
  00000010  fa 3d 34 53 a9 bd 91 51 c9 51 7f 30 24 e4 79 73  .=4S...Q.Q.0$.ys
  00000020  a5 ba d4 78 d9 e9 7b 56 ea 1d 8e 95 ef 6d f4 42  ...x..{V.....m.B
  00000030  3c c7 ee 31 f1 6f 5e 79 f9 3f e1 c3 c9 80 a6 e1  <..1.o^y.?......
  00000040  90 13 bd 57                                      ...W
Incoming raw data
  00000000  e9 ca f0 ab 8d da ca 63 c0 d9 ce b7 27 53 14 f7  .......c....'S..
  00000010  ec 78 0d 26 d1 4c 38 db bf 80 aa 7f 73 b3 af 46  .x.&.L8.....s..F
  00000020  02 88 e3 4a 06 cb 14 7f 45 fb 86 79 82 ad 3a c2  ...J....E..y..:.
  00000030  22 90 da 43 d6 fc 20 23 bd d2 b4 b0 8d 72 6e d1  "..C.. #.....rn.
  00000040  92 2a af 3e 6d c3 f4 21 93 86 95 32 3e 17 ae a8  .*.>m..!...2>...
  00000050  e9 eb 25 cf                                      ..%.
Incoming packet type 51 / 0x33 (SSH2_MSG_USERAUTH_FAILURE)
  00000000  00 00 00 22 70 75 62 6c 69 63 6b 65 79 2c 67 73  ..."publickey,gs
  00000010  73 61 70 69 2d 77 69 74 68 2d 6d 69 63 2c 70 61  sapi-with-mic,pa
  00000020  73 73 77 6f 72 64 00                             ssword.



Alf.


Message was edited by: alfp

Samba errors with Win2008 R2

$
0
0
Hi,

Using RHEL 5.2 64-bit, VAS 3.3.2-142+Samba 3.0.33-3.7.el5; Win 2008 R2. Can you help me?

# vastool status

VAS is currently joined to:                      localdom.com
Join command found in:                           /etc/opt/quest/vas/lastjoin
Verifying timesync with domain controller:       YES
  Time delta: 0 seconds
Are valid VAS licenses installed?                YES
Checking to see if VAS daemon is running:        YES
Checking for valid computer account (SAMNAME)
  PODCAST1$@LOCALDOM.COM                     YES
Checking for valid computer account (SPN)
  host/podcast1.localdom.com@LOCALDOM.COM       YES
Checking to see if VAS is in connected state:    YES
Verifying VAS is configured for name service:    YES
Verifying VAS is configured for auth service:    YES
Verifying VAS configuration file is correct:     YES
Verifying sanity of users allow file:            YES
Verifying sanity of users deny file:             YES
Verifying sanity of group-override file:         YES
Verifying sanity of user-override file:          YES

Samba log:

[2009/12/08 11:33:53, 1] rpc_client/cli_pipe.c:cli_pipe_validate_current_pdu(625)
  cli_pipe_validate_current_pdu: RPC fault code DCERPC fault 0x00000721 received from remote machine DC03.localdom.com pipe \NETLOGON fnum 0x4001!
[2009/12/08 11:37:57, 0] rpc_client/cli_pipe.c:rpc_api_pipe(790)
  rpc_api_pipe: Remote machine DC03.localdom.com pipe \NETLOGON fnum 0x4001returned critical error. Error was NT_STATUS_PIPE_DISCONNECTED
[2009/12/08 11:42:57, 0] rpc_client/cli_pipe.c:rpc_api_pipe(790)
  rpc_api_pipe: Remote machine DC03.localdom.com pipe \NETLOGON fnum 0x4001returned critical error. Error was NT_STATUS_PIPE_DISCONNECTED
[2009/12/08 11:52:57, 0] rpc_client/cli_pipe.c:rpc_api_pipe(790)
  rpc_api_pipe: Remote machine DC03.localdom.com pipe \NETLOGON fnum 0x4001returned critical error. Error was NT_STATUS_PIPE_DISCONNECTED
[...]
[2009/12/11 14:09:54, 0] rpc_client/cli_pipe.c:rpc_api_pipe(790)
  rpc_api_pipe: Remote machine DC01.localdom.com pipe \NETLOGON fnum 0xc00freturned critical error. Error was NT_STATUS_PIPE_DISCONNECTED
[2009/12/11 14:19:54, 0] rpc_client/cli_pipe.c:rpc_api_pipe(790)
  rpc_api_pipe: Remote machine DC01.localdom.com pipe \NETLOGON fnum 0xc00freturned critical error. Error was NT_STATUS_PIPE_DISCONNECTED
[2009/12/11 14:29:54, 0] rpc_client/cli_pipe.c:rpc_api_pipe(790)
  rpc_api_pipe: Remote machine DC01.localdom.com pipe \NETLOGON fnum 0xc00freturned critical error. Error was NT_STATUS_PIPE_DISCONNECTED
[2009/12/11 14:40:23, 0] rpc_client/cli_pipe.c:rpc_api_pipe(790)
  rpc_api_pipe: Remote machine DC01.localdom.com pipe \NETLOGON fnum 0xc00freturned critical error. Error was NT_STATUS_PIPE_DISCONNECTED
[2009/12/11 14:50:23, 0] rpc_client/cli_pipe.c:rpc_api_pipe(790)
  rpc_api_pipe: Remote machine DC01.localdom.com pipe \NETLOGON fnum 0xc00freturned critical error. Error was NT_STATUS_PIPE_DISCONNECTED
[2009/12/11 15:00:23, 0] rpc_client/cli_pipe.c:rpc_api_pipe(790)
  rpc_api_pipe: Remote machine DC01.localdom.com pipe \NETLOGON fnum 0xc00freturned critical error. Error was NT_STATUS_PIPE_DISCONNECTED
[2009/12/11 15:10:23, 0] rpc_client/cli_pipe.c:rpc_api_pipe(790)
  rpc_api_pipe: Remote machine DC01.localdom.com pipe \NETLOGON fnum 0xc00freturned critical error. Error was NT_STATUS_PIPE_DISCONNECTED
[2009/12/11 15:20:23, 0] rpc_client/cli_pipe.c:rpc_api_pipe(790)
  rpc_api_pipe: Remote machine DC01.localdom.com pipe \NETLOGON fnum 0xc00freturned critical error. Error was NT_STATUS_PIPE_DISCONNECTED
[2009/12/11 15:25:26, 0] rpc_client/cli_pipe.c:rpc_api_pipe(790)
  rpc_api_pipe: Remote machine DC01.localdom.com pipe \NETLOGON fnum 0xc00freturned critical error. Error was NT_STATUS_PIPE_DISCONNECTED
[2009/12/11 15:28:41, 0] rpc_client/cli_pipe.c:cli_pipe_verify_schannel(354)
  cli_pipe_verify_schannel: auth_len 56.
[2009/12/11 15:38:42, 1] rpc_client/cli_pipe.c:cli_pipe_validate_current_pdu(625)
  cli_pipe_validate_current_pdu: RPC fault code DCERPC fault 0x00000721 received from remote machine DC03.localdom.com pipe \NETLOGON fnum 0xc001!
[2009/12/11 15:48:42, 0] rpc_client/cli_pipe.c:rpc_api_pipe(790)
  rpc_api_pipe: Remote machine DC03.localdom.com pipe \NETLOGON fnum 0xc001returned critical error. Error was NT_STATUS_PIPE_DISCONNECTED
[2009/12/11 15:58:42, 0] rpc_client/cli_pipe.c:rpc_api_pipe(790)
  rpc_api_pipe: Remote machine DC03.localdom.com pipe \NETLOGON fnum 0xc001returned critical error. Error was NT_STATUS_PIPE_DISCONNECTED
[2009/12/11 16:08:42, 0] rpc_client/cli_pipe.c:rpc_api_pipe(790)
  rpc_api_pipe: Remote machine DC03.localdom.com pipe \NETLOGON fnum 0xc001returned critical error. Error was NT_STATUS_PIPE_DISCONNECTED
[2009/12/11 16:18:42, 0] rpc_client/cli_pipe.c:rpc_api_pipe(790)
  rpc_api_pipe: Remote machine DC03.localdom.com pipe \NETLOGON fnum 0xc001returned critical error. Error was NT_STATUS_PIPE_DISCONNECTED
[2009/12/11 16:28:42, 0] rpc_client/cli_pipe.c:rpc_api_pipe(790)
  rpc_api_pipe: Remote machine DC03.localdom.com pipe \NETLOGON fnum 0xc001returned critical error. Error was NT_STATUS_PIPE_DISCONNECTED


Thank you.

Could not resolve KDC error

$
0
0
I am very new to the QSJ. Below is part of my web.xml and the error I got.
Could anyone please tell me where I have it wrong?

Thanks
Vincent

<filter>

<filter-name>authFilter</filter-name>

<filter-class>com.hulamuba.rtr.authentication.qsj.SsoAndFormsAuthFilter</filter-class>

 

<init-param>

   <param-name>idm.sso.forms.allowUnsecured</param-name>

   <param-value>true</param-value>

</init-param>

 

<init-param>

   <param-name>idm.sso.forms.login-action</param-name>

   <param-value>/login-action.vsj</param-value>

</init-param>

 

</filter>




May 25, 2011 7:06:20 AM org.apache.catalina.core.AprLifecycleListener init
INFO: The Apache Tomcat Native library which allows optimal performance in production environments was not found on the java.library.path: C:\Program Files\Java\jdk1.5.0_11\jre\bin;.;C:\WINDOWS\system32;C:\WINDOWS;C:/Program Files/Java/jre6/bin/client;C:/Program Files/Java/jre6/bin;C:\WINDOWS\system32;C:\WINDOWS;C:\WINDOWS\System32\Wbem;C:\Program Files\Attachmate\INFOCNEE\;C:\Program Files\Attachmate\INFOCNEE\Accmgr32;C:\SFU\common\;C:\Program Files\Common Files\Roxio Shared\DLLShared;C:\Program Files\GuardianEdge\GuardianEdge Clients\;D:\Program Files\Rational\ClearCase\bin;c:\Program Files\Microsoft SQL Server\90\Tools\binn\;C:\Program Files\VanDyke Software\Clients\;D:\Program Files\IBM\RationalSDLC\ClearCase\bin;D:\Program Files\IBM\RationalSDLC\common
May 25, 2011 7:06:20 AM org.apache.coyote.http11.Http11Protocol init
INFO: Initializing Coyote HTTP/1.1 on http-8080
May 25, 2011 7:06:20 AM org.apache.catalina.startup.Catalina load
INFO: Initialization processed in 646 ms
May 25, 2011 7:06:20 AM org.apache.catalina.core.StandardService start
INFO: Starting service Catalina
May 25, 2011 7:06:20 AM org.apache.catalina.core.StandardEngine start
INFO: Starting Servlet Engine: Apache Tomcat/6.0.14
2011-05-25 07:06:28,625 [DEBUG] [com.dstc.security.util.logging.CommonsLogWrapper] loading license idm.sso.license
2011-05-25 07:06:28,641 [DEBUG] [com.dstc.security.util.logging.CommonsLogWrapper] verifying license for module 'idm.sso'
2011-05-25 07:06:28,969 [DEBUG] [com.wedgetail.idm.sso.util.CommonsSsoLogger] Configuring VSJ service principal from idm.principalAtRealm
2011-05-25 07:06:28,969 [DEBUG] [com.wedgetail.idm.sso.util.CommonsSsoLogger] VSJ Standard Edition 3.3 Patch-3548
Initial Parameters -
 VSJ service principal:TESTQSJsvc@DSTEST.HULAMUBA.COM
 kdc:-- no value assigned --
 site:-- no value assigned --
 keytab:-- no value assigned --
 ccache:-- no value assigned --
 allowUnsecured:true
 allowFallback:false
 fallbackCrossRealm:false
 allowNTLM:true
 allowS4U:false
 ntlm.signing.domain  : -- no value assigned --
 ntlm.signing.username: -- no value assigned --
 ntlm.signing.password: -- no value assigned --
 ntlm.signing.always  : false
 ntlm.crossForest: false
 externalTrusts  : -- no value assigned --
 userHandledExcept:false
 policy: -- no value assigned --
 groupsAsRoles: false
 supportMultipleSPN: false
 disableTicketSanityCheck: false
 disableDefaultKrbConfig: false
 disableSpnegoChallenge: false
 flushAuthenticationChallenge: false
 shutdownOnDestroy: false
 trimUnsolicitedBasic: false
 trimUnsolicitedNTLM: false
 trimUnsolicitedSPNEGO: false
 userPrincipalAttribute: -- no value assigned --
 qualifyUserPrincipal: true
 userPrincipalFormatterClass: -- no value assigned --
 directoryFactory: -- no value assigned --
 password: set from idm.password
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos: Found name servers using JNDI
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos: nct0010vpdnsca1.nc.no.HULAMUBA.COM (162.205.245.232)
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos: nct0010vpdnsca2.nc.no.HULAMUBA.COM (162.205.245.231)
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos: det0190vpdnsca1.dcc.HULAMUBA.COM (162.205.87.228)
2011-05-25 07:06:29,719 [DEBUG] [com.dstc.security.util.logging.CommonsLogWrapper] loading license jcsi.kerberos.license
2011-05-25 07:06:29,719 [DEBUG] [com.dstc.security.util.logging.CommonsLogWrapper] verifying license for module 'jcsi.kerberos'
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos: ** requesting initial ticket .. **
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos: ** creating AS request .. **
 for client: TESTQSJsvc
 at realm: DSTEST.HULAMUBA.COM
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos: ** Sending request to KDC .. **
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos: Resolving KDC for realm: DSTEST.HULAMUBA.COM
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos:
 UDP attempt #0 to DNS server nct0010vpdnsca1.nc.no.HULAMUBA.COM/162.205.245.232
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos:  Data sent:
            c8 0c 01 00 00 01 00 00 00 00 00 00 05 5f 6c 64 61 70 04 5f
            74 63 70 06 44 53 54 45 53 54 06 49 52 53 4e 45 54 03 47 4f
            56 00 00 21 00 01
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos: Data received:
            c8 0c 83 80 00 01 00 08 00 03 00 00 05 5f 6c 64 61 70 04 5f
            74 63 70 06 44 53 54 45 53 54 06 49 52 53 4e 45 54 03 47 4f
            56 00 00 21 00 01 c0 0c 00 21 00 01 00 00 00 ec 00 28 00 00
            00 64 01 85 0e 6d 74 62 30 31 32 30 70 6c 38 61 64 33 32 06
            64 73 74 65 73 74 06 69 72 73 6e 65 74 03 67 6f 76 00 c0 0c
            00 21 00 01 00 00 00 ec 00 27 00 32 00 64 01 85 0d 6d 74 62
            30 31 32 30 63 6c 61 64 31 31 06 64 73 74 65 73 74 06 69 72
            73 6e 65 74 03 67 6f 76 00 c0 0c 00 21 00 01 00 00 00 ec 00
            27 00 32 00 64 01 85 0d 6d 74 62 30 31 32 30 63 6c 61 64 31
            32 06 64 73 74 65 73 74 06 69 72 73 6e 65 74 03 67 6f 76 00
            c0 0c 00 21 00 01 00 00 00 ec 00 28 00 32 00 64 01 85 0e 64
            65 74 30 31 39 30 63 6c 64 73 74 73 31 06 64 73 74 65 73 74
            06 69 72 73 6e 65 74 03 67 6f 76 00 c0 0c 00 21 00 01 00 00
            00 ec 00 28 00 00 00 64 01 85 0e 64 65 74 30 31 39 30 63 6c
            64 73 74 73 31 06 64 73 74 65 73 74 06 69 72 73 6e 65 74 03
            67 6f 76 00 c0 0c 00 21 00 01 00 00 00 ec 00 28 00 00 00 64
            01 85 0e 64 65 74 30 31 39 30 70 6c 38 61 64 33 31 06 64 73
            74 65 73 74 06 69 72 73 6e 65 74 03 67 6f 76 00 c0 0c 00 21
            00 01 00 00 00 ec 00 28 00 00 00 64 01 85 0e 6d 65 6d 30 32
            30 30 70 6c 38 61 64 33 31 06 64 73 74 65 73 74 06 69 72 73
            6e 65 74 03 67 6f 76 00 c0 0c 00 21 00 01 00 00 00 ec 00 28
            00 00 00 64 01 85 0e 6d 74 62 30 31 32 30 70 6c 38 61 64 33
            31 06 64 73 74 65 73 74 06 69 72 73 6e 65 74 03 67 6f 76 00
            c1 b9 00 02 00 01 00 00 01 85 00 02 c1 42 c1 b9 00 02 00 01
            00 00 01 85 00 02 c1 76 c1 b9 00 02 00 01 00 00 01 85 00 02
            c1 aa
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos: params: 1000001110000000
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos: Query sent:
  Qname: _ldap._tcp.DSTEST.HULAMUBA.COM
  Qtype: 33
  Qclass: 1
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos:
    Record

      Name: _ldap._tcp.DSTEST.HULAMUBA.COM
      Class: 1
      TTL: 236
      Type: SRV
      Priority: 0
      Weight: 100
      Port: 389
      Target: mtb0120pl8ad32.dstest.HULAMUBA.COM
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos:
    Record

      Name: _ldap._tcp.DSTEST.HULAMUBA.COM
      Class: 1
      TTL: 236
      Type: SRV
      Priority: 50
      Weight: 100
      Port: 389
      Target: mtb0120clad11.dstest.HULAMUBA.COM
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos:
    Record

      Name: _ldap._tcp.DSTEST.HULAMUBA.COM
      Class: 1
      TTL: 236
      Type: SRV
      Priority: 50
      Weight: 100
      Port: 389
      Target: mtb0120clad12.dstest.HULAMUBA.COM
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos:
    Record

      Name: _ldap._tcp.DSTEST.HULAMUBA.COM
      Class: 1
      TTL: 236
      Type: SRV
      Priority: 50
      Weight: 100
      Port: 389
      Target: det0190cldsts1.dstest.HULAMUBA.COM
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos:
    Record

      Name: _ldap._tcp.DSTEST.HULAMUBA.COM
      Class: 1
      TTL: 236
      Type: SRV
      Priority: 0
      Weight: 100
      Port: 389
      Target: det0190cldsts1.dstest.HULAMUBA.COM
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos:
    Record

      Name: _ldap._tcp.DSTEST.HULAMUBA.COM
      Class: 1
      TTL: 236
      Type: SRV
      Priority: 0
      Weight: 100
      Port: 389
      Target: det0190pl8ad31.dstest.HULAMUBA.COM
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos:
    Record

      Name: _ldap._tcp.DSTEST.HULAMUBA.COM
      Class: 1
      TTL: 236
      Type: SRV
      Priority: 0
      Weight: 100
      Port: 389
      Target: mem0200pl8ad31.dstest.HULAMUBA.COM
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos:
    Record

      Name: _ldap._tcp.DSTEST.HULAMUBA.COM
      Class: 1
      TTL: 236
      Type: SRV
      Priority: 0
      Weight: 100
      Port: 389
      Target: mtb0120pl8ad31.dstest.HULAMUBA.COM
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos:
    Record

      Name: dstest.HULAMUBA.COM
      Class: 1
      TTL: 389
      Type: NS
      Name Server: det0190pl8ad31.dstest.HULAMUBA.COM
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos:
    Record

      Name: dstest.HULAMUBA.COM
      Class: 1
      TTL: 389
      Type: NS
      Name Server: mem0200pl8ad31.dstest.HULAMUBA.COM
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos:
    Record

      Name: dstest.HULAMUBA.COM
      Class: 1
      TTL: 389
      Type: NS
      Name Server: mtb0120pl8ad31.dstest.HULAMUBA.COM
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos:
  Too big for UDP, trying TCP
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos:
 Data received:
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos:
            c8 0c 81 80 00 01 00 08 00 07 00 07 05 5f 6c 64 61 70 04 5f
            74 63 70 06 44 53 54 45 53 54 06 49 52 53 4e 45 54 03 47 4f
            56 00 00 21 00 01 c0 0c 00 21 00 01 00 00 00 ec 00 28 00 00
            00 64 01 85 0e 6d 74 62 30 31 32 30 70 6c 38 61 64 33 31 06
            64 73 74 65 73 74 06 69 72 73 6e 65 74 03 67 6f 76 00 c0 0c
            00 21 00 01 00 00 00 ec 00 28 00 00 00 64 01 85 0e 6d 74 62
            30 31 32 30 70 6c 38 61 64 33 32 06 64 73 74 65 73 74 06 69
            72 73 6e 65 74 03 67 6f 76 00 c0 0c 00 21 00 01 00 00 00 ec
            00 27 00 32 00 64 01 85 0d 6d 74 62 30 31 32 30 63 6c 61 64
            31 31 06 64 73 74 65 73 74 06 69 72 73 6e 65 74 03 67 6f 76
            00 c0 0c 00 21 00 01 00 00 00 ec 00 27 00 32 00 64 01 85 0d
            6d 74 62 30 31 32 30 63 6c 61 64 31 32 06 64 73 74 65 73 74
            06 69 72 73 6e 65 74 03 67 6f 76 00 c0 0c 00 21 00 01 00 00
            00 ec 00 28 00 32 00 64 01 85 0e 64 65 74 30 31 39 30 63 6c
            64 73 74 73 31 06 64 73 74 65 73 74 06 69 72 73 6e 65 74 03
            67 6f 76 00 c0 0c 00 21 00 01 00 00 00 ec 00 28 00 00 00 64
            01 85 0e 64 65 74 30 31 39 30 63 6c 64 73 74 73 31 06 64 73
            74 65 73 74 06 69 72 73 6e 65 74 03 67 6f 76 00 c0 0c 00 21
            00 01 00 00 00 ec 00 28 00 00 00 64 01 85 0e 64 65 74 30 31
            39 30 70 6c 38 61 64 33 31 06 64 73 74 65 73 74 06 69 72 73
            6e 65 74 03 67 6f 76 00 c0 0c 00 21 00 01 00 00 00 ec 00 28
            00 00 00 64 01 85 0e 6d 65 6d 30 32 30 30 70 6c 38 61 64 33
            31 06 64 73 74 65 73 74 06 69 72 73 6e 65 74 03 67 6f 76 00
            c1 b9 00 02 00 01 00 00 01 85 00 02 c1 42 c1 b9 00 02 00 01
            00 00 01 85 00 02 c1 76 c1 b9 00 02 00 01 00 00 01 85 00 02
            c1 aa c1 b9 00 02 00 01 00 00 01 85 00 02 c0 40 c1 b9 00 02
            00 01 00 00 01 85 00 02 c0 74 c1 b9 00 02 00 01 00 00 01 85
            00 02 c0 a8 c1 b9 00 02 00 01 00 00 01 85 00 02 c0 db c1 42
            00 01 00 01 00 00 05 bf 00 04 98 de b8 a2 c1 76 00 01 00 01
            00 00 05 bf 00 04 0a eb 66 2c c1 aa 00 01 00 01 00 00 05 bf
            00 04 0a db 50 62 c0 40 00 01 00 01 00 00 06 6f 00 04 0a cf
            14 6b c0 74 00 01 00 01 00 00 0b c3 00 04 0a cf 14 6d c0 a8
            00 01 00 01 00 00 01 c0 00 04 98 e1 3e a9 c0 db 00 01 00 01
            00 00 06 01 00 04 98 e1 3e a8
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos: params: 1000000110000000
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos: Query sent:
  Qname: _ldap._tcp.DSTEST.HULAMUBA.COM
  Qtype: 33
  Qclass: 1
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos:
    Record

      Name: _ldap._tcp.DSTEST.HULAMUBA.COM
      Class: 1
      TTL: 236
      Type: SRV
      Priority: 0
      Weight: 100
      Port: 389
      Target: mtb0120pl8ad31.dstest.HULAMUBA.COM
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos:
    Record

      Name: _ldap._tcp.DSTEST.HULAMUBA.COM
      Class: 1
      TTL: 236
      Type: SRV
      Priority: 0
      Weight: 100
      Port: 389
      Target: mtb0120pl8ad32.dstest.HULAMUBA.COM
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos:
    Record

      Name: _ldap._tcp.DSTEST.HULAMUBA.COM
      Class: 1
      TTL: 236
      Type: SRV
      Priority: 50
      Weight: 100
      Port: 389
      Target: mtb0120clad11.dstest.HULAMUBA.COM
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos:
    Record

      Name: _ldap._tcp.DSTEST.HULAMUBA.COM
      Class: 1
      TTL: 236
      Type: SRV
      Priority: 50
      Weight: 100
      Port: 389
      Target: mtb0120clad12.dstest.HULAMUBA.COM
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos:
    Record

      Name: _ldap._tcp.DSTEST.HULAMUBA.COM
      Class: 1
      TTL: 236
      Type: SRV
      Priority: 50
      Weight: 100
      Port: 389
      Target: det0190cldsts1.dstest.HULAMUBA.COM
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos:
    Record

      Name: _ldap._tcp.DSTEST.HULAMUBA.COM
      Class: 1
      TTL: 236
      Type: SRV
      Priority: 0
      Weight: 100
      Port: 389
      Target: det0190cldsts1.dstest.HULAMUBA.COM
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos:
    Record

      Name: _ldap._tcp.DSTEST.HULAMUBA.COM
      Class: 1
      TTL: 236
      Type: SRV
      Priority: 0
      Weight: 100
      Port: 389
      Target: det0190pl8ad31.dstest.HULAMUBA.COM
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos:
    Record

      Name: _ldap._tcp.DSTEST.HULAMUBA.COM
      Class: 1
      TTL: 236
      Type: SRV
      Priority: 0
      Weight: 100
      Port: 389
      Target: mem0200pl8ad31.dstest.HULAMUBA.COM
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos:
    Record

      Name: dstest.HULAMUBA.COM
      Class: 1
      TTL: 389
      Type: NS
      Name Server: det0190cldsts1.dstest.HULAMUBA.COM
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos:
    Record

      Name: dstest.HULAMUBA.COM
      Class: 1
      TTL: 389
      Type: NS
      Name Server: det0190pl8ad31.dstest.HULAMUBA.COM
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos:
    Record

      Name: dstest.HULAMUBA.COM
      Class: 1
      TTL: 389
      Type: NS
      Name Server: mem0200pl8ad31.dstest.HULAMUBA.COM
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos:
    Record

      Name: dstest.HULAMUBA.COM
      Class: 1
      TTL: 389
      Type: NS
      Name Server: mtb0120pl8ad31.dstest.HULAMUBA.COM
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos:
    Record

      Name: dstest.HULAMUBA.COM
      Class: 1
      TTL: 389
      Type: NS
      Name Server: mtb0120pl8ad32.dstest.HULAMUBA.COM
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos:
    Record

      Name: dstest.HULAMUBA.COM
      Class: 1
      TTL: 389
      Type: NS
      Name Server: mtb0120clad11.dstest.HULAMUBA.COM
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos:
    Record

      Name: dstest.HULAMUBA.COM
      Class: 1
      TTL: 389
      Type: NS
      Name Server: mtb0120clad12.dstest.HULAMUBA.COM
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos:
    Record

      Name: det0190cldsts1.dstest.HULAMUBA.COM
      Class: 1
      TTL: 1471
      Type: A
      IP Address: 162.202.184.162
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos:
    Record

      Name: det0190pl8ad31.dstest.HULAMUBA.COM
      Class: 1
      TTL: 1471
      Type: A
      IP Address: 107.215.102.44
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos:
    Record

      Name: mem0200pl8ad31.dstest.HULAMUBA.COM
      Class: 1
      TTL: 1471
      Type: A
      IP Address: 107.209.80.98
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos:
    Record

      Name: mtb0120pl8ad31.dstest.HULAMUBA.COM
      Class: 1
      TTL: 1647
      Type: A
      IP Address: 107.217.20.107
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos:
    Record

      Name: mtb0120pl8ad32.dstest.HULAMUBA.COM
      Class: 1
      TTL: 3011
      Type: A
      IP Address: 107.217.20.109
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos:
    Record

      Name: mtb0120clad11.dstest.HULAMUBA.COM
      Class: 1
      TTL: 448
      Type: A
      IP Address: 162.215.62.169
[DEBUG] Wed May 25 07:06:29 EDT 2011 jcsi.kerberos:
    Record

      Name: mtb0120clad12.dstest.HULAMUBA.COM
      Class: 1
      TTL: 1537
      Type: A
      IP Address: 162.215.62.168
2011-05-25 07:06:30,000 [DEBUG] [com.wedgetail.idm.sso.util.CommonsSsoLogger] Start TCP LDAP ping to mtb0120pl8ad31.dstest.HULAMUBA.COM/10.207.20.107 port 389
2011-05-25 07:06:30,469 [DEBUG] [com.wedgetail.idm.sso.util.CommonsSsoLogger]   End TCP LDAP ping to mtb0120pl8ad31.dstest.HULAMUBA.COM/10.207.20.107 port 389
2011-05-25 07:06:30,469 [DEBUG] [com.wedgetail.idm.sso.util.CommonsSsoLogger]  Site result = "GALILEO"
[DEBUG] Wed May 25 07:06:30 EDT 2011 jcsi.kerberos:
 UDP attempt #0 to DNS server nct0010vpdnsca1.nc.no.HULAMUBA.COM/162.205.245.232
[DEBUG] Wed May 25 07:06:30 EDT 2011 jcsi.kerberos:  Data sent:
            ba 93 01 00 00 01 00 00 00 00 00 00 09 5f 6b 65 72 62 65 72
            6f 73 04 5f 74 63 70 0d 4e 45 57 43 41 52 52 4f 4c 4c 54 4f
            4e 06 5f 73 69 74 65 73 06 44 53 54 45 53 54 06 49 52 53 4e
            45 54 03 47 4f 56 00 00 21 00 01
[DEBUG] Wed May 25 07:06:30 EDT 2011 jcsi.kerberos: Data received:
            ba 93 81 80 00 01 00 05 00 07 00 02 09 5f 6b 65 72 62 65 72
            6f 73 04 5f 74 63 70 0d 4e 45 57 43 41 52 52 4f 4c 4c 54 4f
            4e 06 5f 73 69 74 65 73 06 44 53 54 45 53 54 06 49 52 53 4e
            45 54 03 47 4f 56 00 00 21 00 01 c0 0c 00 21 00 01 00 00 02
            58 00 27 00 32 00 64 00 58 0d 6d 74 62 30 31 32 30 63 6c 61
            64 31 32 06 64 73 74 65 73 74 06 69 72 73 6e 65 74 03 67 6f
            76 00 c0 0c 00 21 00 01 00 00 02 58 00 28 00 32 00 64 00 58
            0e 64 65 74 30 31 39 30 63 6c 64 73 74 73 31 06 64 73 74 65
            73 74 06 69 72 73 6e 65 74 03 67 6f 76 00 c0 0c 00 21 00 01
            00 00 02 58 00 28 00 00 00 64 00 58 0e 6d 65 6d 30 32 30 30
            76 6c 64 73 74 73 31 06 64 73 74 65 73 74 06 69 72 73 6e 65
            74 03 67 6f 76 00 c0 0c 00 21 00 01 00 00 02 58 00 28 00 00
            00 64 00 58 0e 6d 74 62 30 31 32 30 70 6c 38 61 64 33 32 06
            64 73 74 65 73 74 06 69 72 73 6e 65 74 03 67 6f 76 00 c0 0c
            00 21 00 01 00 00 02 58 00 27 00 32 00 64 00 58 0d 6d 74 62
            30 31 32 30 63 6c 61 64 31 31 06 64 73 74 65 73 74 06 69 72
            73 6e 65 74 03 67 6f 76 00 c1 36 00 02 00 01 00 00 01 84 00
            02 c0 f4 c1 36 00 02 00 01 00 00 01 84 00 02 c1 28 c1 36 00
            02 00 01 00 00 01 84 00 02 c0 59 c1 36 00 02 00 01 00 00 01
            84 00 02 c0 8c c1 36 00 02 00 01 00 00 01 84 00 11 0e 64 65
            74 30 31 39 30 70 6c 38 61 64 33 31 c1 36 c1 36 00 02 00 01
            00 00 01 84 00 11 0e 6d 65 6d 30 32 30 30 70 6c 38 61 64 33
            31 c1 36 c1 36 00 02 00 01 00 00 01 84 00 11 0e 6d 74 62 30
            31 32 30 70 6c 38 61 64 33 31 c1 36 c0 f4 00 01 00 01 00 00
            0b c2 00 04 0a cf 14 6d c1 28 00 01 00 01 00 00 01 bf 00 04
            98 e1 3e a9
[DEBUG] Wed May 25 07:06:30 EDT 2011 jcsi.kerberos: params: 1000000110000000
[DEBUG] Wed May 25 07:06:30 EDT 2011 jcsi.kerberos: Query sent:
  Qname: _kerberos._tcp.GALILEO._sites.DSTEST.HULAMUBA.COM
  Qtype: 33
  Qclass: 1
[DEBUG] Wed May 25 07:06:30 EDT 2011 jcsi.kerberos:
    Record

      Name: _kerberos._tcp.GALILEO._sites.DSTEST.HULAMUBA.COM
      Class: 1
      TTL: 600
      Type: SRV
      Priority: 50
      Weight: 100
      Port: 88
      Target: mtb0120clad12.dstest.HULAMUBA.COM
[DEBUG] Wed May 25 07:06:30 EDT 2011 jcsi.kerberos:
    Record

      Name: _kerberos._tcp.GALILEO._sites.DSTEST.HULAMUBA.COM
      Class: 1
      TTL: 600
      Type: SRV
      Priority: 50
      Weight: 100
      Port: 88
      Target: det0190cldsts1.dstest.HULAMUBA.COM
[DEBUG] Wed May 25 07:06:30 EDT 2011 jcsi.kerberos:
    Record

      Name: _kerberos._tcp.GALILEO._sites.DSTEST.HULAMUBA.COM
      Class: 1
      TTL: 600
      Type: SRV
      Priority: 0
      Weight: 100
      Port: 88
      Target: mem0200vldsts1.dstest.HULAMUBA.COM
[DEBUG] Wed May 25 07:06:30 EDT 2011 jcsi.kerberos:
    Record

      Name: _kerberos._tcp.GALILEO._sites.DSTEST.HULAMUBA.COM
      Class: 1
      TTL: 600
      Type: SRV
      Priority: 0
      Weight: 100
      Port: 88
      Target: mtb0120pl8ad32.dstest.HULAMUBA.COM
[DEBUG] Wed May 25 07:06:30 EDT 2011 jcsi.kerberos:
    Record

      Name: _kerberos._tcp.GALILEO._sites.DSTEST.HULAMUBA.COM
      Class: 1
      TTL: 600
      Type: SRV
      Priority: 50
      Weight: 100
      Port: 88
      Target: mtb0120clad11.dstest.HULAMUBA.COM
[DEBUG] Wed May 25 07:06:30 EDT 2011 jcsi.kerberos:
    Record

      Name: dstest.HULAMUBA.COM
      Class: 1
      TTL: 388
      Type: NS
      Name Server: mtb0120pl8ad32.dstest.HULAMUBA.COM
[DEBUG] Wed May 25 07:06:30 EDT 2011 jcsi.kerberos:
    Record

      Name: dstest.HULAMUBA.COM
      Class: 1
      TTL: 388
      Type: NS
      Name Server: mtb0120clad11.dstest.HULAMUBA.COM
[DEBUG] Wed May 25 07:06:30 EDT 2011 jcsi.kerberos:
    Record

      Name: dstest.HULAMUBA.COM
      Class: 1
      TTL: 388
      Type: NS
      Name Server: mtb0120clad12.dstest.HULAMUBA.COM
[DEBUG] Wed May 25 07:06:30 EDT 2011 jcsi.kerberos:
    Record

      Name: dstest.HULAMUBA.COM
      Class: 1
      TTL: 388
      Type: NS
      Name Server: det0190cldsts1.dstest.HULAMUBA.COM
[DEBUG] Wed May 25 07:06:30 EDT 2011 jcsi.kerberos:
    Record

      Name: dstest.HULAMUBA.COM
      Class: 1
      TTL: 388
      Type: NS
      Name Server: det0190pl8ad31.dstest.HULAMUBA.COM
[DEBUG] Wed May 25 07:06:30 EDT 2011 jcsi.kerberos:
    Record

      Name: dstest.HULAMUBA.COM
      Class: 1
      TTL: 388
      Type: NS
      Name Server: mem0200pl8ad31.dstest.HULAMUBA.COM
[DEBUG] Wed May 25 07:06:30 EDT 2011 jcsi.kerberos:
    Record

      Name: dstest.HULAMUBA.COM
      Class: 1
      TTL: 388
      Type: NS
      Name Server: mtb0120pl8ad31.dstest.HULAMUBA.COM
[DEBUG] Wed May 25 07:06:30 EDT 2011 jcsi.kerberos:
    Record

      Name: mtb0120pl8ad32.dstest.HULAMUBA.COM
      Class: 1
      TTL: 3010
      Type: A
      IP Address: 107.217.20.109
[DEBUG] Wed May 25 07:06:30 EDT 2011 jcsi.kerberos:
    Record

      Name: mtb0120clad11.dstest.HULAMUBA.COM
      Class: 1
      TTL: 447
      Type: A
      IP Address: 162.215.62.169
2011-05-25 07:06:30,547 [ERROR] [com.wedgetail.idm.sso.util.CommonsSsoLogger] VSJ credentials (principal, realm, keytab/password) are invalid
com.wedgetail.idm.sso.ConfigException: Could not validate VSJ password [caused by: GSSException: Failure unspecified at GSS-API level (Mechanism level: com.dstc.security.kerberos.KerberosConfigException: Could not resolve KDC from DNS SRV record:  java.net.UnknownHostException: mem0200vldsts1.dstest.HULAMUBA.COM: mem0200vldsts1.dstest.HULAMUBA.COM)]
 at com.wedgetail.idm.sso.util.Util.checkAgainstKDC(Util.java:181)
 at com.wedgetail.idm.sso.AbstractAuthenticator.initAuthenticator2(AbstractAuthenticator.java:556)
 at com.wedgetail.idm.sso.AbstractAuthenticator.initAuthenticator(AbstractAuthenticator.java:325)
 at com.wedgetail.idm.sso.AuthFilter.init(AuthFilter.java:131)
 at com.hulamuba.rtr.authentication.qsj.FormsAuthFilter.init(FormsAuthFilter.java:217)
 at org.apache.catalina.core.ApplicationFilterConfig.getFilter(ApplicationFilterConfig.java:275)
 at org.apache.catalina.core.ApplicationFilterConfig.setFilterDef(ApplicationFilterConfig.java:397)
 at org.apache.catalina.core.ApplicationFilterConfig.<init>(ApplicationFilterConfig.java:108)
 at org.apache.catalina.core.StandardContext.filterStart(StandardContext.java:3696)
 at org.apache.catalina.core.StandardContext.start(StandardContext.java:4343)
 at org.apache.catalina.core.ContainerBase.start(ContainerBase.java:1045)
 at org.apache.catalina.core.StandardHost.start(StandardHost.java:719)
 at org.apache.catalina.core.ContainerBase.start(ContainerBase.java:1045)
 at org.apache.catalina.core.StandardEngine.start(StandardEngine.java:443)
 at org.apache.catalina.core.StandardService.start(StandardService.java:516)
 at org.apache.catalina.core.StandardServer.start(StandardServer.java:710)
 at org.apache.catalina.startup.Catalina.start(Catalina.java:566)
 at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
 at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:39)
 at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25)
 at java.lang.reflect.Method.invoke(Method.java:585)
 at org.apache.catalina.startup.Bootstrap.start(Bootstrap.java:288)
 at org.apache.catalina.startup.Bootstrap.main(Bootstrap.java:413)
Caused by: GSSException: Failure unspecified at GSS-API level (Mechanism level: com.dstc.security.kerberos.KerberosConfigException: Could not resolve KDC from DNS SRV record:  java.net.UnknownHostException: mem0200vldsts1.dstest.HULAMUBA.COM: mem0200vldsts1.dstest.HULAMUBA.COM)
 at com.dstc.security.kerberos.gssapi.GSSKrbException.create(GSSKrbException.java:208)
 at com.dstc.security.kerberos.gssapi.ImmortalTGT.checkTGT(ImmortalTGT.java:123)
 at com.dstc.security.kerberos.gssapi.GSSCredentialFactory.createImmortalTGT(GSSCredentialFactory.java:24)
 at com.wedgetail.idm.sso.util.ServerTGT.generateTGT(ServerTGT.java:81)
 at com.wedgetail.idm.sso.util.ServerTGT.getTGT(ServerTGT.java:56)
 at com.wedgetail.idm.sso.util.Util.checkAgainstKDC(Util.java:165)
 ... 22 more
Caused by: com.dstc.security.kerberos.KerberosConfigException: Could not resolve KDC from DNS SRV record:  java.net.UnknownHostException: mem0200vldsts1.dstest.HULAMUBA.COM: mem0200vldsts1.dstest.HULAMUBA.COM
 at com.dstc.security.kerberos.DefaultConfig.genKDCInfo(DefaultConfig.java:399)
 at com.dstc.security.kerberos.ActiveDirectorySitesConfig.getKdcs(ActiveDirectorySitesConfig.java:206)
 at com.dstc.security.kerberos.CustomConfig.getKdcs(CustomConfig.java:284)
 at com.dstc.security.kerberos.CustomConfig.getKdcs(CustomConfig.java:265)
 at com.dstc.security.kerberos.impl.DefaultKdcResolver.getKdc(DefaultKdcResolver.java:58)
 at com.dstc.security.kerberos.DefaultKerberosMessageHandler.send(DefaultKerberosMessageHandler.java:84)
 at com.dstc.security.kerberos.Kerberos.sendRequestToKDC(Kerberos.java:1832)
 at com.dstc.security.kerberos.Kerberos.getKrbASRepFromKDC(Kerberos.java:1105)
 at com.dstc.security.kerberos.Kerberos.requestInitialTicket(Kerberos.java:966)
 at com.dstc.security.kerberos.impl.CredentialUtil.getInitialCred(CredentialUtil.java:64)
 at com.dstc.security.kerberos.impl.CredentialUtil.getTicketGrantingTicket(CredentialUtil.java:41)
 at com.dstc.security.kerberos.gssapi.ImmortalTGT.generateTGT(ImmortalTGT.java:150)
 at com.dstc.security.kerberos.gssapi.ImmortalTGT.checkTGT(ImmortalTGT.java:119)
 ... 26 more
Caused by:
GSSException: Failure unspecified at GSS-API level (Mechanism level: com.dstc.security.kerberos.KerberosConfigException: Could not resolve KDC from DNS SRV record:  java.net.UnknownHostException: mem0200vldsts1.dstest.HULAMUBA.COM: mem0200vldsts1.dstest.HULAMUBA.COM)
 at com.dstc.security.kerberos.gssapi.GSSKrbException.create(GSSKrbException.java:208)
 at com.dstc.security.kerberos.gssapi.ImmortalTGT.checkTGT(ImmortalTGT.java:123)
 at com.dstc.security.kerberos.gssapi.GSSCredentialFactory.createImmortalTGT(GSSCredentialFactory.java:24)
 at com.wedgetail.idm.sso.util.ServerTGT.generateTGT(ServerTGT.java:81)
 at com.wedgetail.idm.sso.util.ServerTGT.getTGT(ServerTGT.java:56)
 at com.wedgetail.idm.sso.util.Util.checkAgainstKDC(Util.java:165)
 at com.wedgetail.idm.sso.AbstractAuthenticator.initAuthenticator2(AbstractAuthenticator.java:556)
 at com.wedgetail.idm.sso.AbstractAuthenticator.initAuthenticator(AbstractAuthenticator.java:325)
 at com.wedgetail.idm.sso.AuthFilter.init(AuthFilter.java:131)
 at com.hulamuba.rtr.authentication.qsj.FormsAuthFilter.init(FormsAuthFilter.java:217)
 at org.apache.catalina.core.ApplicationFilterConfig.getFilter(ApplicationFilterConfig.java:275)
 at org.apache.catalina.core.ApplicationFilterConfig.setFilterDef(ApplicationFilterConfig.java:397)
 at org.apache.catalina.core.ApplicationFilterConfig.<init>(ApplicationFilterConfig.java:108)
 at org.apache.catalina.core.StandardContext.filterStart(StandardContext.java:3696)
 at org.apache.catalina.core.StandardContext.start(StandardContext.java:4343)
 at org.apache.catalina.core.ContainerBase.start(ContainerBase.java:1045)
 at org.apache.catalina.core.StandardHost.start(StandardHost.java:719)
 at org.apache.catalina.core.ContainerBase.start(ContainerBase.java:1045)
 at org.apache.catalina.core.StandardEngine.start(StandardEngine.java:443)
 at org.apache.catalina.core.StandardService.start(StandardService.java:516)
 at org.apache.catalina.core.StandardServer.start(StandardServer.java:710)
 at org.apache.catalina.startup.Catalina.start(Catalina.java:566)
 at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
 at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:39)
 at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25)
 at java.lang.reflect.Method.invoke(Method.java:585)
 at org.apache.catalina.startup.Bootstrap.start(Bootstrap.java:288)
 at org.apache.catalina.startup.Bootstrap.main(Bootstrap.java:413)
Caused by: com.dstc.security.kerberos.KerberosConfigException: Could not resolve KDC from DNS SRV record:  java.net.UnknownHostException: mem0200vldsts1.dstest.HULAMUBA.COM: mem0200vldsts1.dstest.HULAMUBA.COM
 at com.dstc.security.kerberos.DefaultConfig.genKDCInfo(DefaultConfig.java:399)
 at com.dstc.security.kerberos.ActiveDirectorySitesConfig.getKdcs(ActiveDirectorySitesConfig.java:206)
 at com.dstc.security.kerberos.CustomConfig.getKdcs(CustomConfig.java:284)
 at com.dstc.security.kerberos.CustomConfig.getKdcs(CustomConfig.java:265)
 at com.dstc.security.kerberos.impl.DefaultKdcResolver.getKdc(DefaultKdcResolver.java:58)
 at com.dstc.security.kerberos.DefaultKerberosMessageHandler.send(DefaultKerberosMessageHandler.java:84)
 at com.dstc.security.kerberos.Kerberos.sendRequestToKDC(Kerberos.java:1832)
 at com.dstc.security.kerberos.Kerberos.getKrbASRepFromKDC(Kerberos.java:1105)
 at com.dstc.security.kerberos.Kerberos.requestInitialTicket(Kerberos.java:966)
 at com.dstc.security.kerberos.impl.CredentialUtil.getInitialCred(CredentialUtil.java:64)
 at com.dstc.security.kerberos.impl.CredentialUtil.getTicketGrantingTicket(CredentialUtil.java:41)
 at com.dstc.security.kerberos.gssapi.ImmortalTGT.generateTGT(ImmortalTGT.java:150)
 at com.dstc.security.kerberos.gssapi.ImmortalTGT.checkTGT(ImmortalTGT.java:119)
 ... 26 more
2011-05-25 07:06:30,547 [ERROR] [com.wedgetail.idm.sso.util.CommonsSsoLogger] Error during initAuthenticator()
com.wedgetail.idm.sso.ConfigException: Could not validate VSJ password [caused by: GSSException: Failure unspecified at GSS-API level (Mechanism level: com.dstc.security.kerberos.KerberosConfigException: Could not resolve KDC from DNS SRV record:  java.net.UnknownHostException: mem0200vldsts1.dstest.HULAMUBA.COM: mem0200vldsts1.dstest.HULAMUBA.COM)]
 at com.wedgetail.idm.sso.util.Util.checkAgainstKDC(Util.java:181)
 at com.wedgetail.idm.sso.AbstractAuthenticator.initAuthenticator2(AbstractAuthenticator.java:556)
 at com.wedgetail.idm.sso.AbstractAuthenticator.initAuthenticator(AbstractAuthenticator.java:325)
 at com.wedgetail.idm.sso.AuthFilter.init(AuthFilter.java:131)
 at com.hulamuba.rtr.authentication.qsj.FormsAuthFilter.init(FormsAuthFilter.java:217)
 at org.apache.catalina.core.ApplicationFilterConfig.getFilter(ApplicationFilterConfig.java:275)
 at org.apache.catalina.core.ApplicationFilterConfig.setFilterDef(ApplicationFilterConfig.java:397)
 at org.apache.catalina.core.ApplicationFilterConfig.<init>(ApplicationFilterConfig.java:108)
 at org.apache.catalina.core.StandardContext.filterStart(StandardContext.java:3696)
 at org.apache.catalina.core.StandardContext.start(StandardContext.java:4343)
 at org.apache.catalina.core.ContainerBase.start(ContainerBase.java:1045)
 at org.apache.catalina.core.StandardHost.start(StandardHost.java:719)
 at org.apache.catalina.core.ContainerBase.start(ContainerBase.java:1045)
 at org.apache.catalina.core.StandardEngine.start(StandardEngine.java:443)
 at org.apache.catalina.core.StandardService.start(StandardService.java:516)
 at org.apache.catalina.core.StandardServer.start(StandardServer.java:710)
 at org.apache.catalina.startup.Catalina.start(Catalina.java:566)
 at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
 at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:39)
 at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25)
 at java.lang.reflect.Method.invoke(Method.java:585)
 at org.apache.catalina.startup.Bootstrap.start(Bootstrap.java:288)
 at org.apache.catalina.startup.Bootstrap.main(Bootstrap.java:413)
Caused by: GSSException: Failure unspecified at GSS-API level (Mechanism level: com.dstc.security.kerberos.KerberosConfigException: Could not resolve KDC from DNS SRV record:  java.net.UnknownHostException: mem0200vldsts1.dstest.HULAMUBA.COM: mem0200vldsts1.dstest.HULAMUBA.COM)
 at com.dstc.security.kerberos.gssapi.GSSKrbException.create(GSSKrbException.java:208)
 at com.dstc.security.kerberos.gssapi.ImmortalTGT.checkTGT(ImmortalTGT.java:123)
 at com.dstc.security.kerberos.gssapi.GSSCredentialFactory.createImmortalTGT(GSSCredentialFactory.java:24)
 at com.wedgetail.idm.sso.util.ServerTGT.generateTGT(ServerTGT.java:81)
 at com.wedgetail.idm.sso.util.ServerTGT.getTGT(ServerTGT.java:56)
 at com.wedgetail.idm.sso.util.Util.checkAgainstKDC(Util.java:165)
 ... 22 more
Caused by: com.dstc.security.kerberos.KerberosConfigException: Could not resolve KDC from DNS SRV record:  java.net.UnknownHostException: mem0200vldsts1.dstest.HULAMUBA.COM: mem0200vldsts1.dstest.HULAMUBA.COM
 at com.dstc.security.kerberos.DefaultConfig.genKDCInfo(DefaultConfig.java:399)
 at com.dstc.security.kerberos.ActiveDirectorySitesConfig.getKdcs(ActiveDirectorySitesConfig.java:206)
 at com.dstc.security.kerberos.CustomConfig.getKdcs(CustomConfig.java:284)
 at com.dstc.security.kerberos.CustomConfig.getKdcs(CustomConfig.java:265)
 at com.dstc.security.kerberos.impl.DefaultKdcResolver.getKdc(DefaultKdcResolver.java:58)
 at com.dstc.security.kerberos.DefaultKerberosMessageHandler.send(DefaultKerberosMessageHandler.java:84)
 at com.dstc.security.kerberos.Kerberos.sendRequestToKDC(Kerberos.java:1832)
 at com.dstc.security.kerberos.Kerberos.getKrbASRepFromKDC(Kerberos.java:1105)
 at com.dstc.security.kerberos.Kerberos.requestInitialTicket(Kerberos.java:966)
 at com.dstc.security.kerberos.impl.CredentialUtil.getInitialCred(CredentialUtil.java:64)
 at com.dstc.security.kerberos.impl.CredentialUtil.getTicketGrantingTicket(CredentialUtil.java:41)
 at com.dstc.security.kerberos.gssapi.ImmortalTGT.generateTGT(ImmortalTGT.java:150)
 at com.dstc.security.kerberos.gssapi.ImmortalTGT.checkTGT(ImmortalTGT.java:119)
 ... 26 more
Caused by:
GSSException: Failure unspecified at GSS-API level (Mechanism level: com.dstc.security.kerberos.KerberosConfigException: Could not resolve KDC from DNS SRV record:  java.net.UnknownHostException: mem0200vldsts1.dstest.HULAMUBA.COM: mem0200vldsts1.dstest.HULAMUBA.COM)
 at com.dstc.security.kerberos.gssapi.GSSKrbException.create(GSSKrbException.java:208)
 at com.dstc.security.kerberos.gssapi.ImmortalTGT.checkTGT(ImmortalTGT.java:123)
 at com.dstc.security.kerberos.gssapi.GSSCredentialFactory.createImmortalTGT(GSSCredentialFactory.java:24)
 at com.wedgetail.idm.sso.util.ServerTGT.generateTGT(ServerTGT.java:81)
 at com.wedgetail.idm.sso.util.ServerTGT.getTGT(ServerTGT.java:56)
 at com.wedgetail.idm.sso.util.Util.checkAgainstKDC(Util.java:165)
 at com.wedgetail.idm.sso.AbstractAuthenticator.initAuthenticator2(AbstractAuthenticator.java:556)
 at com.wedgetail.idm.sso.AbstractAuthenticator.initAuthenticator(AbstractAuthenticator.java:325)
 at com.wedgetail.idm.sso.AuthFilter.init(AuthFilter.java:131)
 at com.hulamuba.rtr.authentication.qsj.FormsAuthFilter.init(FormsAuthFilter.java:217)
 at org.apache.catalina.core.ApplicationFilterConfig.getFilter(ApplicationFilterConfig.java:275)
 at org.apache.catalina.core.ApplicationFilterConfig.setFilterDef(ApplicationFilterConfig.java:397)
 at org.apache.catalina.core.ApplicationFilterConfig.<init>(ApplicationFilterConfig.java:108)
 at org.apache.catalina.core.StandardContext.filterStart(StandardContext.java:3696)
 at org.apache.catalina.core.StandardContext.start(StandardContext.java:4343)
 at org.apache.catalina.core.ContainerBase.start(ContainerBase.java:1045)
 at org.apache.catalina.core.StandardHost.start(StandardHost.java:719)
 at org.apache.catalina.core.ContainerBase.start(ContainerBase.java:1045)
 at org.apache.catalina.core.StandardEngine.start(StandardEngine.java:443)
 at org.apache.catalina.core.StandardService.start(StandardService.java:516)
 at org.apache.catalina.core.StandardServer.start(StandardServer.java:710)
 at org.apache.catalina.startup.Catalina.start(Catalina.java:566)
 at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
 at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:39)
 at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25)
 at java.lang.reflect.Method.invoke(Method.java:585)
 at org.apache.catalina.startup.Bootstrap.start(Bootstrap.java:288)
 at org.apache.catalina.startup.Bootstrap.main(Bootstrap.java:413)
Caused by: com.dstc.security.kerberos.KerberosConfigException: Could not resolve KDC from DNS SRV record:  java.net.UnknownHostException: mem0200vldsts1.dstest.HULAMUBA.COM: mem0200vldsts1.dstest.HULAMUBA.COM
 at com.dstc.security.kerberos.DefaultConfig.genKDCInfo(DefaultConfig.java:399)
 at com.dstc.security.kerberos.ActiveDirectorySitesConfig.getKdcs(ActiveDirectorySitesConfig.java:206)
 at com.dstc.security.kerberos.CustomConfig.getKdcs(CustomConfig.java:284)
 at com.dstc.security.kerberos.CustomConfig.getKdcs(CustomConfig.java:265)
 at com.dstc.security.kerberos.impl.DefaultKdcResolver.getKdc(DefaultKdcResolver.java:58)
 at com.dstc.security.kerberos.DefaultKerberosMessageHandler.send(DefaultKerberosMessageHandler.java:84)
 at com.dstc.security.kerberos.Kerberos.sendRequestToKDC(Kerberos.java:1832)
 at com.dstc.security.kerberos.Kerberos.getKrbASRepFromKDC(Kerberos.java:1105)
 at com.dstc.security.kerberos.Kerberos.requestInitialTicket(Kerberos.java:966)
 at com.dstc.security.kerberos.impl.CredentialUtil.getInitialCred(CredentialUtil.java:64)
 at com.dstc.security.kerberos.impl.CredentialUtil.getTicketGrantingTicket(CredentialUtil.java:41)
 at com.dstc.security.kerberos.gssapi.ImmortalTGT.generateTGT(ImmortalTGT.java:150)
 at com.dstc.security.kerberos.gssapi.ImmortalTGT.checkTGT(ImmortalTGT.java:119)
 ... 26 more
May 25, 2011 7:06:30 AM org.apache.catalina.core.StandardContext filterStart
SEVERE: Exception starting filter authFilter
com.wedgetail.idm.sso.ConfigException: Could not validate VSJ password [caused by: GSSException: Failure unspecified at GSS-API level (Mechanism level: com.dstc.security.kerberos.KerberosConfigException: Could not resolve KDC from DNS SRV record:  java.net.UnknownHostException: mem0200vldsts1.dstest.HULAMUBA.COM: mem0200vldsts1.dstest.HULAMUBA.COM)]
 at com.wedgetail.idm.sso.util.Util.checkAgainstKDC(Util.java:181)
 at com.wedgetail.idm.sso.AbstractAuthenticator.initAuthenticator2(AbstractAuthenticator.java:556)
 at com.wedgetail.idm.sso.AbstractAuthenticator.initAuthenticator(AbstractAuthenticator.java:325)
 at com.wedgetail.idm.sso.AuthFilter.init(AuthFilter.java:131)
 at com.hulamuba.rtr.authentication.qsj.FormsAuthFilter.init(FormsAuthFilter.java:217)
 at org.apache.catalina.core.ApplicationFilterConfig.getFilter(ApplicationFilterConfig.java:275)
 at org.apache.catalina.core.ApplicationFilterConfig.setFilterDef(ApplicationFilterConfig.java:397)
 at org.apache.catalina.core.ApplicationFilterConfig.<init>(ApplicationFilterConfig.java:108)
 at org.apache.catalina.core.StandardContext.filterStart(StandardContext.java:3696)
 at org.apache.catalina.core.StandardContext.start(StandardContext.java:4343)
 at org.apache.catalina.core.ContainerBase.start(ContainerBase.java:1045)
 at org.apache.catalina.core.StandardHost.start(StandardHost.java:719)
 at org.apache.catalina.core.ContainerBase.start(ContainerBase.java:1045)
 at org.apache.catalina.core.StandardEngine.start(StandardEngine.java:443)
 at org.apache.catalina.core.StandardService.start(StandardService.java:516)
 at org.apache.catalina.core.StandardServer.start(StandardServer.java:710)
 at org.apache.catalina.startup.Catalina.start(Catalina.java:566)
 at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
 at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:39)
 at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25)
 at java.lang.reflect.Method.invoke(Method.java:585)
 at org.apache.catalina.startup.Bootstrap.start(Bootstrap.java:288)
 at org.apache.catalina.startup.Bootstrap.main(Bootstrap.java:413)
Caused by: GSSException: Failure unspecified at GSS-API level (Mechanism level: com.dstc.security.kerberos.KerberosConfigException: Could not resolve KDC from DNS SRV record:  java.net.UnknownHostException: mem0200vldsts1.dstest.HULAMUBA.COM: mem0200vldsts1.dstest.HULAMUBA.COM)
 at com.dstc.security.kerberos.gssapi.GSSKrbException.create(GSSKrbException.java:208)
 at com.dstc.security.kerberos.gssapi.ImmortalTGT.checkTGT(ImmortalTGT.java:123)
 at com.dstc.security.kerberos.gssapi.GSSCredentialFactory.createImmortalTGT(GSSCredentialFactory.java:24)
 at com.wedgetail.idm.sso.util.ServerTGT.generateTGT(ServerTGT.java:81)
 at com.wedgetail.idm.sso.util.ServerTGT.getTGT(ServerTGT.java:56)
 at com.wedgetail.idm.sso.util.Util.checkAgainstKDC(Util.java:165)
 ... 22 more
Caused by: com.dstc.security.kerberos.KerberosConfigException: Could not resolve KDC from DNS SRV record:  java.net.UnknownHostException: mem0200vldsts1.dstest.HULAMUBA.COM: mem0200vldsts1.dstest.HULAMUBA.COM
 at com.dstc.security.kerberos.DefaultConfig.genKDCInfo(DefaultConfig.java:399)
 at com.dstc.security.kerberos.ActiveDirectorySitesConfig.getKdcs(ActiveDirectorySitesConfig.java:206)
 at com.dstc.security.kerberos.CustomConfig.getKdcs(CustomConfig.java:284)
 at com.dstc.security.kerberos.CustomConfig.getKdcs(CustomConfig.java:265)
 at com.dstc.security.kerberos.impl.DefaultKdcResolver.getKdc(DefaultKdcResolver.java:58)
 at com.dstc.security.kerberos.DefaultKerberosMessageHandler.send(DefaultKerberosMessageHandler.java:84)
 at com.dstc.security.kerberos.Kerberos.sendRequestToKDC(Kerberos.java:1832)
 at com.dstc.security.kerberos.Kerberos.getKrbASRepFromKDC(Kerberos.java:1105)
 at com.dstc.security.kerberos.Kerberos.requestInitialTicket(Kerberos.java:966)
 at com.dstc.security.kerberos.impl.CredentialUtil.getInitialCred(CredentialUtil.java:64)
 at com.dstc.security.kerberos.impl.CredentialUtil.getTicketGrantingTicket(CredentialUtil.java:41)
 at com.dstc.security.kerberos.gssapi.ImmortalTGT.generateTGT(ImmortalTGT.java:150)
 at com.dstc.security.kerberos.gssapi.ImmortalTGT.checkTGT(ImmortalTGT.java:119)
 ... 26 more
Caused by: GSSException: Failure unspecified at GSS-API level (Mechanism level: com.dstc.security.kerberos.KerberosConfigException: Could not resolve KDC from DNS SRV record:  java.net.UnknownHostException: mem0200vldsts1.dstest.HULAMUBA.COM: mem0200vldsts1.dstest.HULAMUBA.COM)
 at com.dstc.security.kerberos.gssapi.GSSKrbException.create(GSSKrbException.java:208)
 at com.dstc.security.kerberos.gssapi.ImmortalTGT.checkTGT(ImmortalTGT.java:123)
 at com.dstc.security.kerberos.gssapi.GSSCredentialFactory.createImmortalTGT(GSSCredentialFactory.java:24)
 at com.wedgetail.idm.sso.util.ServerTGT.generateTGT(ServerTGT.java:81)
 at com.wedgetail.idm.sso.util.ServerTGT.getTGT(ServerTGT.java:56)
 at com.wedgetail.idm.sso.util.Util.checkAgainstKDC(Util.java:165)
 at com.wedgetail.idm.sso.AbstractAuthenticator.initAuthenticator2(AbstractAuthenticator.java:556)
 at com.wedgetail.idm.sso.AbstractAuthenticator.initAuthenticator(AbstractAuthenticator.java:325)
 at com.wedgetail.idm.sso.AuthFilter.init(AuthFilter.java:131)
 at com.hulamuba.rtr.authentication.qsj.FormsAuthFilter.init(FormsAuthFilter.java:217)
 at org.apache.catalina.core.ApplicationFilterConfig.getFilter(ApplicationFilterConfig.java:275)
 at org.apache.catalina.core.ApplicationFilterConfig.setFilterDef(ApplicationFilterConfig.java:397)
 at org.apache.catalina.core.ApplicationFilterConfig.<init>(ApplicationFilterConfig.java:108)
 at org.apache.catalina.core.StandardContext.filterStart(StandardContext.java:3696)
 at org.apache.catalina.core.StandardContext.start(StandardContext.java:4343)
 at org.apache.catalina.core.ContainerBase.start(ContainerBase.java:1045)
 at org.apache.catalina.core.StandardHost.start(StandardHost.java:719)
 at org.apache.catalina.core.ContainerBase.start(ContainerBase.java:1045)
 at org.apache.catalina.core.StandardEngine.start(StandardEngine.java:443)
 at org.apache.catalina.core.StandardService.start(StandardService.java:516)
 at org.apache.catalina.core.StandardServer.start(StandardServer.java:710)
 at org.apache.catalina.startup.Catalina.start(Catalina.java:566)
 at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
 at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:39)
 at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25)
 at java.lang.reflect.Method.invoke(Method.java:585)
 at org.apache.catalina.startup.Bootstrap.start(Bootstrap.java:288)
 at org.apache.catalina.startup.Bootstrap.main(Bootstrap.java:413)
Caused by: com.dstc.security.kerberos.KerberosConfigException: Could not resolve KDC from DNS SRV record:  java.net.UnknownHostException: mem0200vldsts1.dstest.HULAMUBA.COM: mem0200vldsts1.dstest.HULAMUBA.COM
 at com.dstc.security.kerberos.DefaultConfig.genKDCInfo(DefaultConfig.java:399)
 at com.dstc.security.kerberos.ActiveDirectorySitesConfig.getKdcs(ActiveDirectorySitesConfig.java:206)
 at com.dstc.security.kerberos.CustomConfig.getKdcs(CustomConfig.java:284)
 at com.dstc.security.kerberos.CustomConfig.getKdcs(CustomConfig.java:265)
 at com.dstc.security.kerberos.impl.DefaultKdcResolver.getKdc(DefaultKdcResolver.java:58)
 at com.dstc.security.kerberos.DefaultKerberosMessageHandler.send(DefaultKerberosMessageHandler.java:84)
 at com.dstc.security.kerberos.Kerberos.sendRequestToKDC(Kerberos.java:1832)
 at com.dstc.security.kerberos.Kerberos.getKrbASRepFromKDC(Kerberos.java:1105)
 at com.dstc.security.kerberos.Kerberos.requestInitialTicket(Kerberos.java:966)
 at com.dstc.security.kerberos.impl.CredentialUtil.getInitialCred(CredentialUtil.java:64)
 at com.dstc.security.kerberos.impl.CredentialUtil.getTicketGrantingTicket(CredentialUtil.java:41)
 at com.dstc.security.kerberos.gssapi.ImmortalTGT.generateTGT(ImmortalTGT.java:150)
 at com.dstc.security.kerberos.gssapi.ImmortalTGT.checkTGT(ImmortalTGT.java:119)
 ... 26 more
May 25, 2011 7:06:30 AM org.apache.catalina.core.StandardContext start
SEVERE: Error filterStart
May 25, 2011 7:06:30 AM org.apache.catalina.core.StandardContext start
SEVERE: Context [/RTR] startup failed due to previous errors
May 25, 2011 7:06:31 AM org.apache.coyote.http11.Http11Protocol start
INFO: Starting Coyote HTTP/1.1 on http-8080
May 25, 2011 7:06:31 AM org.apache.jk.common.ChannelSocket init
INFO: JK: ajp13 listening on /0.0.0.0:8009
May 25, 2011 7:06:31 AM org.apache.jk.server.JkMain start
INFO: Jk running ID=0 time=0/63  config=null
May 25, 2011 7:06:31 AM org.apache.catalina.startup.Catalina start
INFO: Server startup in 10993 ms

Message was edited by: VincentD

Message was edited by: VincentD

Quest SAMBA Require non-shell users UNIX enabled flag in AD?

$
0
0
Hello,

I am quickly trying to learn the basics of Quest Samba
Version 3.0.30-Quest-325, OS = Solaris 10 (5.10)

My question.  We use this for our application to retrieve invoice images for the users to view invoice images.  The application calls the images.

We had an older of Samba where each user was added to unix but without a shell to prevent them from being able to SSH to the box.

Now we use VAS. 

Is there a way to have Samba authenticate against a AD group so that when a new user is added, the would not required the "unix enabled" flag?

We are trying to have this work soley on VAS and not have them use the unix enabled flad from the ad console for each user.

Thank you.

configure problems with mod_auth_vas-3.6.7

$
0
0
Hi,


After I upgraded Red Hat  Enterprise Linux Server release 6.3 (Santiago) from V6.2,
I start getting [notice] child pid xxxx exit signal Segmentation fault (11) errors.

I decided to try to compile mod_auth_vas from the source. When I use configure, I am getting the following errors:

configure: WARNING: gssapi_krb5.h: present but cannot be compiled
configure: WARNING: gssapi_krb5.h:     check for missing prerequisite headers?
configure: WARNING: gssapi_krb5.h: see the Autoconf documentation
configure: WARNING: gssapi_krb5.h:     section "Present But Cannot Be Compiled"
configure: WARNING: gssapi_krb5.h: proceeding with the compiler's result
configure: WARNING:     ## -------------------------------------- ##
configure: WARNING:     ## Report this to David.Leonard@quest.com ##
configure: WARNING:     ## -------------------------------------- ##



I send an email to David, but my email was return.

Does any one has any idea how to fix this problem?

Thanks in advance

Nobuo

Quest Authentication Services 4.1 pre-release

$
0
0
All,

We are looking for a few customers to test our pre-release of QAS 4.1 in early January. Here is your chance to try out the new feature set, and get direct support from our development team on the new release, before we ship it live. Please send me an email (glen.davis@quest.com) if you have interest and would like to hear more about it.

Thanks,
Glen Davis
Product Manager

wyse T50 problem with key "." layout pt-BR keyboard ABNT2

$
0
0

I'm using Wyse T50 with brazilian ABNT2 keyboard(pt-BR) and the key "."(point) in numeric keyboard does work inside rdpclient. It works fine with console and other apps outside rdpclient but not inside. Using rdpclient with parameter --lx-debug helped to get the keycode 0x79 but I do not how to fix it. I installed Remmina/Rdesktop and all the keys works fine, so I guess the problem is with Wyse-rdpclient/RDP.

 

Any idea?

 

Thanks in advance


Alternate way to supply vsj properties

$
0
0

 

We are trying to use the vsj servlet filter in one of the vendor supplied web application, where we can not include vsj-federation.properties file as part of the deployments.
Is there alternate way of providing "fsProxy", "applicationUrl" and "fsCertificate" properties to the filter?

 


QAS 4.1 Pre-release testing

$
0
0

If there are any other customers that would like to test out the 4.1 pre-release, please email glen.davis@quest.com for more information.  You can

test by putting the new agents on some Servers, or using the updated management tools, or both. 

 

Thanks,

Glen Davis

Product Manager

MAV and cross-forest authentication problems

$
0
0
Our setup is as follows:

====
2 Windows 2003 functional-level forests, FOO.COM and BAR.COM, that mutually (two-way) trust each other.
  FOO.COM <-- forest trust --> BAR.COM

Furthermore, there's a domain A.FOO.COM that belongs to the FOO.COM forest.  There's another domain B.BAR.COM belonging to the BAR.COM forest.  There's a one-way outgoing external trust from A.FOO.COM to B.BAR.COM.
  A.FOO.COM -- external trust --> B.BAR.COM
====

The behavior we're seeing is when a user from B.BAR.COM attempts to access a website on A.FOO.COM, the user gets a basic auth challenge for their id/password.  The user would enter the credentials they have from B.BAR.COM and they would get successfully authenticated.  This seems to indicate the proper trust relationships are in place.

What we're trying to understand is why SPNEGO/Kerberos is not taking place.  Can MAV (or rather VAS) handle AD referrals?  Do we need to raise the trust level between our domains?

Any thoughts appreciated.  Thanks.

P.S.  The underlying VAS version we're using is:  3.3.1.101

Using Cached Kerberos Ticket to Authenticate SMB Share

$
0
0

I am using Quest Authentication Services to integrate my Linux systems with our lab domain. I want to use the cached kerberos tickets to authenticate without providing a password when mounting an exported SMB share using the command 'mount -t cifs <device> <dir> -o sec=krb5'. My understanding is that when request-key is called by the kernel cifs.upcall is used to locate the cached kerberos ticket. The problem I am having is that when I directly call cifs.upcall with the uid of the user it does not return anything and it has an exit code of 1. If I look at /var/log/messages I see the following log message related to the call.

 

Jun 19 09:55:03 merlin cifs.upcall: keyctl_describe_alloc failed: Required key not available

 

Per the cifs.upcall man page I added the following two lines to request-key.conf

 

create cifs.spnego * * /usr/local/sbin/cifs.upcall %k

create dns_resolver * * /usr/local/sbin/cifs.upcall %k

 

BK

Segmentation fault when mod_auth_vas finds no matches

$
0
0
Hello,

We are using mod_auth_vas.so 3.6.7 with Oracle HTTP Server which is effectively Apache 2.0. Recently, we have noticed that an Apache process is terminated with a segmentation fault in case of mod_auth_vas trying to match the requestor's name to the list of allowed user names and but not finding it there. The client's browser receives 401 in this case. Could you please help with it?

Please find an excerpt from the error log

[2012-06-01T14:14:38.8683+01:00] [OHS] [INCIDENT_ERROR:32] [OHS-9999] [mod_auth_vas.c] [host_id: ausvmqtcdevap19.us.dell.com] [host_addr: 10.166.44.87] [tid: 1144846656] [user: oracle] [ecid: 004kMZrRnhR6uHC_NDG7ye0003a7000007] [rid: 0] [VirtualHost: ausvmqtcdevap19.us.dell.com:8044] mod_auth_vas.c:1581:  [mod_auth_vas] authenticated user: 'Dmitry_Donetskov@EMEA.DELL.COM'

[2012-06-01T14:14:38.8683+01:00] [OHS] [INCIDENT_ERROR:32] [OHS-9999] [mod_auth_vas.c] [host_id: ausvmqtcdevap19.us.dell.com] [host_addr: 10.166.44.87] [tid: 1144846656] [user: oracle] [ecid: 004kMZrRnhR6uHC_NDG7ye0003a7000007] [rid: 0] [VirtualHost: ausvmqtcdevap19.us.dell.com:8044] mod_auth_vas.c:1037:  [mod_auth_vas] auth_vas_auth_checker: user=Dmitry_Donetskov@EMEA.DELL.COM authtype=VAS

[2012-06-01T14:14:38.8683+01:00] [OHS] [INCIDENT_ERROR:32] [OHS-9999] [mod_auth_vas.c] [host_id: ausvmqtcdevap19.us.dell.com] [host_addr: 10.166.44.87] [tid: 1144846656] [user: oracle] [ecid: 004kMZrRnhR6uHC_NDG7ye0003a7000007] [rid: 0] [VirtualHost: ausvmqtcdevap19.us.dell.com:8044] mod_auth_vas.c:1055:  [mod_auth_vas] requires->nelts = 3

[2012-06-01T14:14:38.8683+01:00] [OHS] [INCIDENT_ERROR:32] [OHS-9999] [mod_auth_vas.c] [host_id: ausvmqtcdevap19.us.dell.com] [host_addr: 10.166.44.87] [tid: 1144846656] [user: oracle] [ecid: 004kMZrRnhR6uHC_NDG7ye0003a7000007] [rid: 0] [VirtualHost: ausvmqtcdevap19.us.dell.com:8044] mod_auth_vas.c:541:  [mod_auth_vas] match_user: name=ServiceSFDCWPSIT@emea.dell.com RUSER=Dmitry_Donetskov@EMEA.DELL.COM

[2012-06-01T14:14:38.8683+01:00] [OHS] [INCIDENT_ERROR:32] [OHS-9999] [mod_auth_vas.c] [host_id: ausvmqtcdevap19.us.dell.com] [host_addr: 10.166.44.87] [tid: 1144846656] [user: oracle] [ecid: 004kMZrRnhR6uHC_NDG7ye0003a7000007] [rid: 0] [VirtualHost: ausvmqtcdevap19.us.dell.com:8044] mod_auth_vas.c:1422:  [mod_auth_vas] rnote_get: reusing existing rnote

[2012-06-01T14:14:38.8683+01:00] [OHS] [INCIDENT_ERROR:32] [OHS-9999] [mod_auth_vas.c] [host_id: ausvmqtcdevap19.us.dell.com] [host_addr: 10.166.44.87] [tid: 1144846656] [user: oracle] [ecid: 004kMZrRnhR6uHC_NDG7ye0003a7000007] [rid: 0] [VirtualHost: ausvmqtcdevap19.us.dell.com:8044] mod_auth_vas.c:490:  [mod_auth_vas] set_user_obj

[2012-06-01T14:14:38.8708+01:00] [OHS] [INCIDENT_ERROR:32] [OHS-9999] [mod_auth_vas.c] [host_id: ausvmqtcdevap19.us.dell.com] [host_addr: 10.166.44.87] [tid: 1144846656] [user: oracle] [ecid: 004kMZrRnhR6uHC_NDG7ye0003a7000007] [rid: 0] [VirtualHost: ausvmqtcdevap19.us.dell.com:8044] mod_auth_vas.c:574:  [mod_auth_vas] match_user: user does not match

[2012-06-01T14:14:38.8708+01:00] [OHS] [INCIDENT_ERROR:32] [OHS-9999] [mod_auth_vas.c] [host_id: ausvmqtcdevap19.us.dell.com] [host_addr: 10.166.44.87] [tid: 1144846656] [user: oracle] [ecid: 004kMZrRnhR6uHC_NDG7ye0003a7000007] [rid: 0] [VirtualHost: ausvmqtcdevap19.us.dell.com:8044] mod_auth_vas.c:584:  [mod_auth_vas] match_user: <CN=ServiceSFDCWPSIT,OU=Service Accounts,DC=emea,DC=dell,DC=com> <CN=dmitry_donetskov,OU=Users,OU=Moscow,DC=emea,DC=dell,DC=com> no-match

[2012-06-01T14:14:38.8709+01:00] [OHS] [INCIDENT_ERROR:32] [OHS-9999] [mod_auth_vas.c] [host_id: ausvmqtcdevap19.us.dell.com] [host_addr: 10.166.44.87] [tid: 1144846656] [user: oracle] [ecid: 004kMZrRnhR6uHC_NDG7ye0003a7000007] [rid: 0] [VirtualHost: ausvmqtcdevap19.us.dell.com:8044] mod_auth_vas.c:1100:  [mod_auth_vas] require user "ServiceSFDCWPSIT@emea.dell.com" -> FAIL

...........

[2012-06-01T14:14:38.9545+01:00] [OHS] [INCIDENT_ERROR:32] [OHS-9999] [mod_auth_vas.c] [host_id: ausvmqtcdevap19.us.dell.com] [host_addr: 10.166.44.87] [tid: 1144846656] [user: oracle] [ecid: 004kMZrRnhR6uHC_NDG7ye0003a7000007] [rid: 0] [VirtualHost: ausvmqtcdevap19.us.dell.com:8044] mod_auth_vas.c:584:  [mod_auth_vas] match_user: <CN=Alexey_Lysak,OU=Users,OU=Non Dell,DC=emea,DC=dell,DC=com> <CN=dmitry_donetskov,OU=Users,OU=Moscow,DC=emea,DC=dell,DC=com> no-match

[2012-06-01T14:14:38.9545+01:00] [OHS] [INCIDENT_ERROR:32] [OHS-9999] [mod_auth_vas.c] [host_id: ausvmqtcdevap19.us.dell.com] [host_addr: 10.166.44.87] [tid: 1144846656] [user: oracle] [ecid: 004kMZrRnhR6uHC_NDG7ye0003a7000007] [rid: 0] [VirtualHost: ausvmqtcdevap19.us.dell.com:8044] mod_auth_vas.c:1100:  [mod_auth_vas] require user "Alexey_Lysak@emea.dell.com" -> FAIL

[2012-06-01T14:14:38.9545+01:00] [OHS] [INCIDENT_ERROR:32] [OHS-9999] [mod_auth_vas.c] [host_id: ausvmqtcdevap19.us.dell.com] [host_addr: 10.166.44.87] [tid: 1144846656] [user: oracle] [ecid: 004kMZrRnhR6uHC_NDG7ye0003a7000007] [rid: 0] [VirtualHost: ausvmqtcdevap19.us.dell.com:8044] mod_auth_vas.c:1422:  [mod_auth_vas] rnote_get: reusing existing rnote

[2012-06-01T14:14:39.4014+01:00] [OHS] [INCIDENT_ERROR:32] [OHS-9999] [mod_ssl.c] [host_id: ausvmqtcdevap19.us.dell.com] [host_addr: 10.166.44.87] [pid: 27201] [tid: 1099520320] [user: oracle] [VirtualHost: ausvmqtcdevap19.us.dell.com:8044] mod_ssl.c:633:  Connection to child 0 established (server ausvmqtcdevap19.us.dell.com:8044)

[2012-06-01T14:14:39.4016+01:00] [OHS] [INCIDENT_ERROR:32] [OHS-9999] [core.c] [host_id: ausvmqtcdevap19.us.dell.com] [host_addr: 10.166.44.87] [pid: 27201] [tid: 1099520320] [user: oracle] [VirtualHost: ausvmqtcdevap19.us.dell.com:8044] ssl_scache_shmcb.c:720:  inside shmcb_retrieve_session

[2012-06-01T14:14:39.4016+01:00] [OHS] [INCIDENT_ERROR:32] [OHS-9999] [core.c] [host_id: ausvmqtcdevap19.us.dell.com] [host_addr: 10.166.44.87] [pid: 27201] [tid: 1099520320] [user: oracle] [VirtualHost: ausvmqtcdevap19.us.dell.com:8044] ssl_scache_shmcb.c:732:  id[0]=4, masked index=4

[2012-06-01T14:14:39.4016+01:00] [OHS] [INCIDENT_ERROR:32] [OHS-9999] [core.c] [host_id: ausvmqtcdevap19.us.dell.com] [host_addr: 10.166.44.87] [pid: 27201] [tid: 1099520320] [user: oracle] [VirtualHost: ausvmqtcdevap19.us.dell.com:8044] ssl_scache_shmcb.c:1197:  entering shmcb_lookup_session_id

[2012-06-01T14:14:39.4016+01:00] [OHS] [INCIDENT_ERROR:32] [OHS-9999] [core.c] [host_id: ausvmqtcdevap19.us.dell.com] [host_addr: 10.166.44.87] [pid: 27201] [tid: 1099520320] [user: oracle] [VirtualHost: ausvmqtcdevap19.us.dell.com:8044] ssl_scache_shmcb.c:983:  entering shmcb_expire_division

[2012-06-01T14:14:39.4016+01:00] [OHS] [INCIDENT_ERROR:32] [OHS-9999] [core.c] [host_id: ausvmqtcdevap19.us.dell.com] [host_addr: 10.166.44.87] [pid: 27201] [tid: 1099520320] [user: oracle] [VirtualHost: ausvmqtcdevap19.us.dell.com:8044] ssl_scache_shmcb.c:1207:  loop=0, count=1, curr_pos=0

[2012-06-01T14:14:39.4016+01:00] [OHS] [INCIDENT_ERROR:32] [OHS-9999] [core.c] [host_id: ausvmqtcdevap19.us.dell.com] [host_addr: 10.166.44.87] [pid: 27201] [tid: 1099520320] [user: oracle] [VirtualHost: ausvmqtcdevap19.us.dell.com:8044] ssl_scache_shmcb.c:1211:  idx->s_id2=47, id[1]=47, offset=0

[2012-06-01T14:14:39.4016+01:00] [OHS] [INCIDENT_ERROR:32] [OHS-9999] [core.c] [host_id: ausvmqtcdevap19.us.dell.com] [host_addr: 10.166.44.87] [pid: 27201] [tid: 1099520320] [user: oracle] [VirtualHost: ausvmqtcdevap19.us.dell.com:8044] ssl_scache_shmcb.c:1228:  at index 0, found possible session match

[2012-06-01T14:14:39.4016+01:00] [OHS] [INCIDENT_ERROR:32] [OHS-9999] [core.c] [host_id: ausvmqtcdevap19.us.dell.com] [host_addr: 10.166.44.87] [pid: 27201] [tid: 1099520320] [user: oracle] [VirtualHost: ausvmqtcdevap19.us.dell.com:8044] ssl_scache_shmcb.c:1247:  a match!

[2012-06-01T14:14:39.4016+01:00] [OHS] [INCIDENT_ERROR:32] [OHS-9999] [core.c] [host_id: ausvmqtcdevap19.us.dell.com] [host_addr: 10.166.44.87] [pid: 27201] [tid: 1099520320] [user: oracle] [VirtualHost: ausvmqtcdevap19.us.dell.com:8044] ssl_scache_shmcb.c:748:  leaving shmcb_retrieve_session

[2012-06-01T14:14:39.4017+01:00] [OHS] [INCIDENT_ERROR:32] [OHS-9999] [core.c] [host_id: ausvmqtcdevap19.us.dell.com] [host_addr: 10.166.44.87] [pid: 27201] [tid: 1099520320] [user: oracle] [VirtualHost: ausvmqtcdevap19.us.dell.com:8044] ssl_scache_shmcb.c:435:  shmcb_retrieve had a hit

[2012-06-01T14:14:39.4017+01:00] [OHS] [INCIDENT_ERROR:32] [OHS-9999] [core.c] [host_id: ausvmqtcdevap19.us.dell.com] [host_addr: 10.166.44.87] [pid: 27201] [tid: 1099520320] [user: oracle] [VirtualHost: ausvmqtcdevap19.us.dell.com:8044] ssl_engine_kernel.c:2304:  Inter-Process Session Cache: request=GET status=FOUND id=042F8428065947E3DA8D7A7B77690889 (session reuse)

[2012-06-01T14:14:39.6975+01:00] [OHS] [NOTIFICATION:16] [OHS-9999] [core.c] [host_id: ausvmqtcdevap19.us.dell.com] [host_addr: 10.166.44.87] [pid: 14727] [tid: 47292192636960] [user: oracle] [VirtualHost: main] mpm_common.c:475:  child pid 27200 exit signal Segmentation fault (11), possible coredump in /u01/app/oracle/fusion/mw_1/Oracle_WT1/instances/instance1/config/OHS/ohs1


Message was edited by: dmitry_donetskov_265

EOL for Quest's Samba Identity Mapper (vasidmap)

$
0
0
Hello:

I am trying to identify the End of Life for Quest's Samba Identity Mapper (vasidmap).
Any help would be greatly appreciated.

Regards,

Gil Lee

WinSSPI not supported on this platform

$
0
0

I am new to Kerberos.  When attempting to build a Kerberos credential, I call:

 

com.dstc.security.kerberos.winSSPI.WinSSPIGSSManager.getInstance();

 

For some people this causes:

 

Caused by: GSSException: Failure unspecified at GSS-API level

at com.dstc.security.kerberos.winSSPI.WinSSPIGSSManager.<init>(WinSSPIGSSManager.java:86)

at com.dstc.security.kerberos.winSSPI.WinSSPIGSSManager.getInstance(WinSSPIGSSManager.java:109)

... 33 more

Caused by: com.dstc.security.kerberos.winSSPI.SSPIException: WinSSPI not supported on this platform (Windows XP)

at com.dstc.security.kerberos.winSSPI.SSPI.initialize(SSPI.java:304)

at com.dstc.security.kerberos.winSSPI.WinSSPIGSSManager.<init>(WinSSPIGSSManager.java:84)

... 34 more

 

For others, it works fine.  I have also seen "WinSSPI not supported on this platform (Windows 7)" on Windows 7 machines.

 

What does that error indicate?  Where can I begin debugging?


Using VAS Apache Module on Multiple Apache instances

$
0
0

Hi all,

 

- I have  a Web Server configured with 2 Apache Instances, each instance running as different user and port.

- I configured the VAS module for Active Directory Authentication on both instances

 

- So, now, the problem, is that in one instance the VAS authentication is working really good, and in the otherone,

we're having problems. It's always requesting Credentials when you try to access any websites hosted on this second instances.

 

The strange thing is that in the first instance, every website is working correctly and it's taking credentials automatically from browser.

 

Have anyone seen this kind of behavior?

 

 

Thanks in advance,

Obed N Munoz

Putty 0.62 session menu with Windows 7

$
0
0

I've recently upgraded to Windows 7, and am enjoying the menu of open putty sessions displayed when I hover my mouse over the putty icon in my toolbar.  HOWEVER, one aspect which bothers me is how the menu displays.  Initially it displays a horizontal list of icons for each session, expanding the list up to 10 sessions, after which it tranforms that list to a vertical list of lines in a single window, one line for each session.  My issue is that once the horizontal list exceeds 6 sessions, the session names contained in the icons get truncated from the right to the point that they are no longer unique, rendering them useless.  Consequently, once I open a 7th session, I proceed to open another 4 simply to maintain the usability of my session menu.  Does anyone know a way to customize either the point at which the menu transfers to a horizontal list, or the session name truncation so that it truncates from the left instead of the right?

NTLM SMB issue - Could not get valid NTLM challenge from ........

$
0
0
I'm trying to debug an issue with NTLM failback, I have the filter configured correctly as per any other deployments.

I'm able to authenticate users correctly using Kerberos, but I have noticed in the logs an issue with NTLM.

This was discovered because of a Java Applet which is posting back to the server, the applet is not using kerberos but NTLM to authenticate the user.

The application server is Tomcat 5, using Quest VSJ "VSJ Standard Edition 3_3 Patch 3548"

From what can be seen within the server logs is that QuestSSO performs a DNS lookup and attempts to connect to all of the GCs which are returned.

Example:
- Starting Coyote HTTP/1.1 on http-80
- JK: ajp13 listening on /0.0.0.0:8009
- Jk running ID=0 time=0/47  config=null
- Host server1.domain.ltd/1.1.1.1:389 appears to be down
- Could not get valid NTLM challenge from server1.domain.ltd/1.1.1.1
Exception: com.wedgetail.idm.sso.ntlm.NtlmException: NTLM challenge was null
- Host server2.domain.ltd/1.1.1.2:389 appears to be down
- Could not get valid NTLM challenge from server2.domain.ltd/1.1.1.2
Exception: com.wedgetail.idm.sso.ntlm.NtlmException: NTLM challenge was null
- Host server3.domain.ltd/1.1.1.3:389 appears to be down
...
... etc


I have enabled the debug level and log4j configuration, but this is not showing any errors.

I have used PortQry.exe to scan the AD servers and they are accessible.


What can I do to move forward? Any ideas ?

Not seeing correct AD group membership using vastool

$
0
0

We have an AD group 'foo'.  User Abe is added to it using AD tools.

 

I cannot see this user in the group using vastool on Solaris.  And of course the user cannot login.

 

$ vastool list groups | grep foo

foo:VAS:2010:john.doe@na.company.com,harry.who@na.company.com

$

 

I've executed vastool flush to no affect.

 

What am I doing wrong?

Kerberos Error: Message Stream modified

$
0
0
Hi,
I'm using SSO with BOXIR2 that use VSJ,
the SSO is working fine until someday SSO is stop with below error messages:
So how to fix this kinda error?



5609 http-8080-Processor25 ERROR com.crystaldecisions.sdk.plugin.authentication.ldap.internal.SecWinADAction - LoginContext failed. Failure unspecified at GSS-API level (Mechanism level: com.dstc.security.kerberos.KerberosError: Message stream modified)
5609 http-8080-Processor25 ERROR com.crystaldecisions.sdk.plugin.authentication.ldap.internal.SecWinADAuthentication - GSSException Failure unspecified at GSS-API level (Mechanism level: com.dstc.security.kerberos.KerberosError: Message stream modified)
5609 http-8080-Processor25 WARN com.crystaldecisions.sdk.occa.security.internal.LogonService - doUserLogon(): failed to logon, logoninfo=user:xxx%xxx,method:GSSCredential,auth=secWinAD,aps=xxx.xx.com
com.crystaldecisions.sdk.exception.SDKException$SecurityError: The Active Directory Authentication plugin could not authenticate at this time. Please try again. If the problem persists, please contact your technical support department.
cause:GSSException: Failure unspecified at GSS-API level (Mechanism level: com.dstc.security.kerberos.KerberosError: Message stream modified)
detail:The Active Directory Authentication plugin could not authenticate at this time. Please try again. If the problem persists, please contact your technical support department.
The exception originally thrown was GSSException: Failure unspecified at GSS-API level (Mechanism level: com.dstc.security.kerberos.KerberosError: Message stream modified)
at com.crystaldecisions.sdk.plugin.authentication.secwinad.internal.b.a(Unknown Source)
at com.crystaldecisions.sdk.plugin.authentication.secwinad.internal.d.a(Unknown Source)
at com.crystaldecisions.sdk.plugin.authentication.secwinad.internal.d.continueLogin(Unknown Source)
at com.crystaldecisions.sdk.occa.security.internal.t.a(Unknown Source)
at com.crystaldecisions.sdk.occa.security.internal.t.a(Unknown Source)
at com.crystaldecisions.sdk.occa.security.internal.t.userLogon(Unknown Source)
at com.crystaldecisions.sdk.occa.security.internal.l.userLogon(Unknown Source)
at com.crystaldecisions.sdk.framework.internal.d.logon(Unknown Source)
at com.crystaldecisions.ePortfolio.framework.logon.LogonAction.singleSignOn(LogonAction.java:406)
at com.crystaldecisions.ePortfolio.framework.logon.LogonAction.autoWrapExceptionPerform(LogonAction.java:525)
at com.crystaldecisions.ePortfolio.framework.common.AutoWrapExceptionAction.process(AutoWrapExceptionAction.java:62)
at com.crystaldecisions.webapp.struts.framework.AbstractEnterpriseAction.perform(AbstractEnterpriseAction.java:38)
at org.apache.struts.action.ActionServlet.processActionPerform(ActionServlet.java:1787)
at org.apache.struts.action.ActionServlet.process(ActionServlet.java:1586)
Viewing all 1046 articles
Browse latest View live