On 24 July 2013 00:29, Klaus Ita <koki....@gmail.com> wrote:

> Thank You for your effort maintaining this package!
>

Apologies for the delayed response.


> We have a running and working heimdal kdc setup in the office. Last week,
> we
> added a new host, usually standard procedure.
>

[...]


> Jul 22 18:39:58 my.host.name login[20923]: pam_krb5(login:auth): (user
> KKK)
> credential verification failed: encryption key has bad length
> Jul 22 18:39:58 my.host.name login[20923]: pam_krb5(login:auth):
> authentication
> failure; logname=KKK uid=0 euid=0 tty=/dev/pts/0 ruser= rhost=
>
>
> google says something about a broken keymap and i agree. When aftre hours
> of
> dns, ntp, password, ldap, ... debugging i just hand-copied the krb5.keytab
> that i generated via 'kadmin -l' on the krb server all 'just worked'.
>

pam_krb5 I think is linked against MIT Kerberos.

Are you able to reproduce the problem with a server that is compiled
against Heimdal?

That way we can rule out compatibility issues between the two different
implementations.
-- 
Brian May <br...@microcomaustralia.com.au>

Reply via email to