The problem is that this is a catch-22.
KDC first.  There's no good ordering that works for all cases.
Well, probably not for all cases, but we might do better as we do now:
Kerberos is unlikely to retrieve any authentication info from any other database. It may require DNS - e.g. to resolve the LDAP host. Bind will have a hard time using LDAP as backend while using Kerberos for the bind, since it would not have the KDC text entries, before it is up. LDAP is unlikely to authenticate to anything (except for replication cases). Hostnames required at start-up refer to itself and can therefore be considered to exist in /etc/hosts.

So LDAP, BIND, Kerberos should catch most setups. But of course the world is larger than that. :)
What probably should happen is that krb5kdc should keep retrying the LDAP
server for a while rather than giving up and exiting.
Yes, that would be a fix ...
(I personally have no idea on the krb524d problems, unfortunately.)
I made a little progress. The connections are created in kadm5_flush(handle) at line 253 in krb524d.c. For some reason gdb does not follow that call (built with export DEB_BUILD_OPTIONS=debug,noopt,nostrip) - hmm, according to readelf the library has no debugging symbols. Seems like debian/rules does not heed debug,nostrip for the libs.




--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to