On 24 July 2013 00:29, Klaus Ita <koki....@gmail.com> wrote: > Thank You for your effort maintaining this package! >
Apologies for the delayed response. > We have a running and working heimdal kdc setup in the office. Last week, > we > added a new host, usually standard procedure. > [...] > Jul 22 18:39:58 my.host.name login[20923]: pam_krb5(login:auth): (user > KKK) > credential verification failed: encryption key has bad length > Jul 22 18:39:58 my.host.name login[20923]: pam_krb5(login:auth): > authentication > failure; logname=KKK uid=0 euid=0 tty=/dev/pts/0 ruser= rhost= > > > google says something about a broken keymap and i agree. When aftre hours > of > dns, ntp, password, ldap, ... debugging i just hand-copied the krb5.keytab > that i generated via 'kadmin -l' on the krb server all 'just worked'. > pam_krb5 I think is linked against MIT Kerberos. Are you able to reproduce the problem with a server that is compiled against Heimdal? That way we can rule out compatibility issues between the two different implementations. -- Brian May <br...@microcomaustralia.com.au>