This section provides information about SEAM error messages, including why each error occurred and a way to fix it.
Unable to view the list of principals or policies; use the Name field. |
The admin principal that you logged on with does not have the list privilege (l) in the Kerberos ACL file (kadm5.acl), so you cannot view the principal or policy lists.
You must enter the principal and policy names in the Name field to work on them, or log on with a principal that has the appropriate privileges.
JNI: Java array creation failed JNI: Java class lookup failed JNI: Java field lookup failed JNI: Java method lookup failed JNI: Java object lookup failed JNI: Java object field lookup failed JNI: Java string access failed JNI: Java string creation failed |
There is a serious problem with the Java Native Interface used by the SEAM Administration Tool (gkadmin).
Exit gkadmin and restart it; if the problem persists, please report a bug.
This section provides an alphabetical list (A-M) of the more common error messages for the SEAM commands, SEAM daemons, PAM framework, GSS interface, and the Kerberos library.
major_error minor_error gssapi error importing name |
An error occurred while importing a service name.
Make sure the host or ftp service principal is in the host's keytab file.
All authentication systems disabled; connection refused |
This version of rlogind does not support any authentication mechanism.
Make sure that rlogind is invoked with the -k option. In fact, this should be the default specified in the inetd.conf file.
Another authentication mechanism must be used to access this host |
Authentication could not be done.
Make sure the client is using Kerberos V5 for authentication.
Authentication negotiation has failed, which is required for encryption. Good bye. |
Authentication could not be negotiated with the server.
Start authentication debugging by invoking the telnet command toggle authdebug and look at the debug messages for further clues. Also, make sure you have valid credentials.
Bad krb5 admin server hostname while initializing kadmin interface |
An invalid host name is configured for the admin server (master KDC) in the krb5.conf file.
Make sure the correct host name is specified in the krb5.conf file for the admin server (master KDC).
Cannot contact any KDC for requested realm |
No KDC responded in the requested realm.
Make sure at least one KDC (either the master or slave) is reachable or that the krb5kdc daemon is running on the KDCs. Look in /etc/krb5/krb5.conf for the list of configured KDCs (kdc = kdc_name).
Cannot determine realm for host |
Kerberos cannot determine the realm name for the host.
Make sure there is a default realm name or the domain name mappings are set up in the Kerberos configuration file (krb5.conf) .
Cannot encrypt-write network |
Problem occurred in encrypting data.
Check for other possible problems in the system. Examine other syslog messages for further clues.
Cannot find KDC for requested realm |
No KDC was found in the requested realm.
Make sure the Kerberos configuration file (krb5.conf) specifies a KDC in the realm section.
cannot initialize realm realm_name |
The KDC may not have a stash file.
Make sure the KDC has a stash file. If not, create one using the kdb5_util(1M) command and try running krb5kdc again (/etc/init.d/kdc).
Cannot resolve KDC for requested realm |
Kerberos cannot determine any KDC for the realm.
Make sure the Kerberos configuration file (krb5.conf) specifies a KDC in the realm section.
Cannot reuse password |
The password you entered has been used before by this principal.
Choose a password that has not been chosen before, at least not within the number of passwords kept in the KDC database for each principal (this is enforced by the principal's policy).
Can't get forwarded credentials |
Credential forwarding could not be established.
Make sure the principal has forwardable credentials.
Can't open/find Kerberos configuration file |
The Kerberos configuration file (krb5.conf) was not available.
Make sure the krb5.conf file is available in the correct location and has the correct permissions (it should be writable by root and readable by everyone else).
Client did not supply required checksum--connection rejected |
Authentication with checksum was not negotiated with the client. The client may be using an old Kerberos V5 protocol that does not support initial connection support.
Make sure the client is using a Kerberos V5 protocol that supports initial connection support.
Client/server realm mismatch in initial ticket request |
A realm mismatch between the client and server occured in the initial ticket request.
Make sure the server you are communicating with is in the same realm as the client or that the realm configurations are correct.
Client or server has a null key |
The principal has a null key.
Modify the principal to have a non-null key by using the cpw command of kadmin(1M).
Communication failure with server while initializing kadmin interface |
The host entered for the admin server (master KDC) did not have kadmind running.
Make sure you specified the correct host name for the master KDC. If you specified the correct host name, make sure that kadmind is running on the master KDC you specified.
Configuration error: Requiring checksums with -c is inconsistent with allowing Kerberos V4 connections |
Authentication with checksum was not negotiated with the client. The client might be using an old Kerberos V5 protocol that does not support initial connection support.
Make sure the client is using a Kerberos V5 protocol that supports initial connection support.
Credentials cache file permissions incorrect |
You do not have the appropriate read or write permissions on the credentials cache (/tmp/krb5cc_uid).
Make sure you have read and write permissions on the credentials cache.
Credentials cache I/O operation failed XXX |
Kerberos had a problem writing to the system's credentials cache (/tmp/krb5cc_uid).
Make sure the credentials cache has not been removed and there is space left on the device by using the df command.
Decrypt integrity check failed |
You might have an invalid ticket.
Make sure your credentials are valid. Destroy your tickets with kdestroy and create new tickets with kinit.
Make sure the target host has a keytab with the correct version of the service key. Use kadmin(1M) to view the key version number of the service principal (for example, host/FQDN_hostname) in the Kerberos database and use klist -k on the target host to make sure it has the same key version number.
des_read retry count exceeded |
An error repeatedly occurred while reading data.
Check for other possible problems in the system. Examine other syslog messages for further clues.
df: cannot statvfs filesystem: Invalid argument |
The df command cannot access the Kerberized NFS file system, which is currently mounted, to generate its report, because you no longer have the appropriate root credentials. Destroying your credentials for a mounted Kerberized file system does not automatically unmount the file system.
You must create new root credentials to access the Kerberized file system. If you no longer require access to the Kerberized file system, unmount the file system.
Encryption could not be enabled. Goodbye. |
Encryption could not be negotiated with the server.
Start authentication debugging by invoking the telnet command toggle encdebug and look at the debug messages for further clues.
Encryption was not successfully negotiated. Goodbye. |
Encryption could not be negotiated.
Check for error messages in the KDC logging file.
End of credential cache reached |
An error occurred while reading the credentials cache (/tmp/krb5cc_uid).
Make sure the credentials cache is readable and contains data.
failed to obtain credentials cache |
During kadmin initialization, a failure occurred when kadmin tried to obtain credentials for the admin principal.
Make sure you used the correct principal and/or password when executing kadmin.
Field is too long for this implementation |
The message size being sent by a Kerberized application was too long. The maximum message size that can be handled by Kerberos is 65535 bytes. In addition, there are limits on individual fields within a protocol message sent by Kerberos.
Make sure that your Kerberized applications are sending valid message sizes.
GSS-API (or Kerberos) error |
This is a generic GSS-API or Kerberos error message and can be caused by several different problems.
Look at the /etc/krb5/kdc.log file to find the more specific GSS-API error message that was logged when this error occurred.
Hostname cannot be canonicalized |
Kerberos cannot make the host name fully qualified.
Make sure the host name is in DNS and the host-name-to-address and address-to-host-name mappings are consistent.
Illegal cross-realm ticket |
The ticket sent did not have the correct cross-realms. The realms may not have the correct trust relationships set up.
Make sure the realms you are using have the correct trust relationships.
Improper format of Kerberos configuration file |
The Kerberos configuration file (krb5.conf) has invalid entries.
Make sure all the relations in the krb5.conf file are followed by the "=" sign and a value, and verify that the brackets are present in pairs for each subsection.
Inappropriate type of checksum in message |
The message contained an invalid checksum type.
Check which valid checksum types are specified in the krb5.conf and kdc.conf files.
Incorrect net address |
There was a mismatch in the network address. The network address in the ticket being forwarded was different from the network address where the ticket was processed. This may occur when forwarding tickets.
Make sure the network addresses are correct; destroy your tickets with kdestroy, and create new tickets with kinit.
Invalid flag for file lock mode |
An internal Kerberos error occurred.
Please report a bug.
Invalid message type specified for encoding |
Kerberos could not recognize the message type sent by the Kerberized application.
If you are using a Kerberized application developed by your site or a vendor, make sure it is using Kerberos correctly.
Invalid number of character classes |
The password you entered for the principal does not contain enough password classes, as enforced by the principal's policy.
Make sure you enter a password with the minimum number of password classes that the policy requires.
KADM err: Memory allocation failure |
There is not enough memory to run kadmin.
Free up memory and try running kadmin again.
KDC can't fulfill requested option |
The KDC did not allow the requested option. A possible problem may be that postdating or forwardable options were being requested and the KDC did not allow it. Another problem may be that you requested the renewal of a TGT but you didn't have a renewable TGT.
Determine if you are requesting an option that either the KDC does not allow or if you are requesting something you don't have.
KDC policy rejects request |
The KDC policy did not allow the request. For example, the request to the KDC did not have an IP address in its request, or forwarding was requested but the KDC did not allow it.
Make sure you are using kinit with the correct options. If necessary, modify the policy associated with the principal or change the principal's attributes to allow the request. You can modify the policy or principal by using kadmin(1M).
KDC reply did not match expectations |
The KDC reply did not contain the expected principal name, or other values in the response were incorrect.
Make sure the KDC you are communicating with complies with RFC1510, the request you are sending is a Kerberos V5 request, or that the KDC is available.
Kerberos V5 refuses authentication |
Authentication could not be negotiated with the server.
Start authentication debugging by invoking the telnet command toggle authdebug and look at the debug messages for further clues. Also, make sure you have valid credentials.
Key table entry not found |
There is no entry for the service principal in the network application server's keytab.
Add the appropriate service principal to the server's keytab so it can provide the Kerberized service.
Key version number for principal in key table is incorrect |
A principal's key version is different in the keytab and in the Kerberos database. Either a service's key has been changed or you may be using an old service ticket.
If a service's key has been changed (for example, by using kadmin) , you need to extract the new key and store it in the host's keytab where the service is running.
Alternately, you may be using an old service ticket that has an older key. You may want to do a kdestroy and then a kinit again.
login: load_modules: can not open module /usr/lib/security/pam_krb5.so.1 |
Either the Kerberos PAM module is missing or it is not a valid executable binary.
Make sure the Kerberos PAM module is in /usr/lib/security and it is a valid executable binary. Also, make sure /etc/pam.conf contains the correct path to pam_krb5.so.1.
Looping detected inside krb5_get_in_tkt |
Kerberos made several attempts to get the initial tickets but failed.
Make sure at least one KDC is responding to authentication requests.
Master key does not match database |
The loaded database dump was not created from a database containing the master key, which is located in /var/krb5/.k5.REALM.
Make sure the master key in the loaded database dump matches the master key located in /var/krb5/.k5.REALM.
Matching credential not found |
The matching credential for request was not found. Your request requires credentials that are not available in the credentials cache.
Destroy your tickets with kdestroy and create new tickets with kinit.
Message out of order |
Messages sent using sequential-order privacy arrived out of order. Some messages may have been lost in transit.
You should re-initialize the Kerberos session.
Message stream modified |
There was a mismatch between the computed checksum and message checksum. The message may have been modified while in transit, which may indicate a security leak.
Make sure that the messages are being sent across the network correctly. Since this message may also indicate possible tampering of messages while they are being sent, destroy your tickets using kdestroy and reinitialize the Kerberos services you are using.
This section provides an alphabetical list (N-Z) of the more common error messages for the SEAM commands, SEAM daemons, PAM framework, and the Kerberos library.
No authentication systems were enabled; all connections will be refused |
This version of rlogind does not support any authentication mechanism.
Make sure that rlogind is invoked with the -k option. In fact, this should be the default specified in the inetd.conf file.
No credentials cache file found |
Kerberos could not find the credentials cache (/tmp/krb5cc_uid).
Make sure the credential file exists and is readable. If it isn't, try performing a kinit again.
Operation requires "privilege" privilege |
The admin principal being used does not have the appropriate privilege configured in the kadm5.acl file.
Use a principal that has the appropriate privileges or configure the principal being used to have the appropriate privileges by modifying the kadm5.acl file. Usually, a principal with "/admin" as part of its name has the appropriate privileges.
PAM-KRB5: Kerberos V5 authentication failed: password incorrect |
Your UNIX password and Kerberos passwords are different. Most non-Kerberized commands, such as login, are set up through PAM to automatically authenticate with Kerberos by using the same password that you specified for your UNIX password. If your passwords are different, the Kerberos authentication fails.
You must enter your Kerberos password when prompted.
Password is in the password dictionary |
The password that you entered is in a password dictionary that is being used. It is not a good choice for a password.
Choose a password that has a mix of password classes.
Permission denied in replay cache code |
The system's replay cache could not be opened. The server may have been first run under a user ID different than your current user ID.
Make sure the replay cache has the appropriate permissions. The replay cache is stored on the host where the Kerberized server application is running (/usr/tmp/rc_service_name). Instead of changing the permissions on the current replay cache, you can also remove the replay cache before running the Kerberized server under a different user ID.
Protocol version mismatch |
Most likely a Kerberos V4 request was sent to the KDC. SEAM supports only the Kerberos V5 protocol.
Make sure your applications are using the Kerberos V5 protocol.
Request is a replay |
The request has already been sent to this server and processed. The tickets may have been stolen and someone else is trying to reuse the tickets.
Wait for a few minutes and re-issue the request.
Requested principal and ticket don't match |
The service principal you are connecting to and the service ticket you have do not match.
Make sure DNS is functioning properly. If you are using another vendor's software, make sure it is using principal names correctly.
Requested protocol version not supported |
Most likely a Kerberos V4 request was sent to the KDC. SEAM supports only the Kerberos V5 protocol.
Make sure your applications are using the Kerberos V5 protocol.
Required parameters in krb5.conf missing while initializing kadmin interface |
There is a missing parameter (such as the admin_server parameter) in the kr5.conf file.
Determine what the missing parameter is and add it to krb5.conf.
Server refused to negotiate encryption. Good bye. |
Encryption could not be negotiated with the server.
Start authentication debugging by invoking the telnet command toggle encdebug and look at the debug messages for further clues.
Server rejected authentication (during sendauth exchange) |
The server you are trying to communicate with rejected the authentication. Most often this error occurs when doing Kerberos database propagation. Some common causes may be problems with the kpropd.acl file, DNS, or keytabs.
If you get this error when running applications other than kprop, investigate whether the server's keytab is correct.
The ticket isn't for us OR Ticket/authenticator don't match |
There was a mismatch between the ticket and authenticator. The principal name in the request may not have matched the service principal's name, because the ticket was being sent with an FQDN name of the principal while the service expected non-FQDN or vice versa.
Make sure the service principal you are using is correct.
Ticket expired |
Your ticket times have expired.
Destroy your tickets with kdestroy and create new tickets with kinit.
Ticket is ineligible for postdating |
The principal does not allow its tickets to be postdated.
Modify the principal with kadmin(1M) to allow postdating.
Ticket not yet valid |
The postdated ticket is not valid yet.
Create new tickets with the correct date or wait until the current tickets are valid.
Truncated input file detected |
The database dump file being used in the operation is not a complete dump file.
Create the dump file again or use a different database dump file.
Unable to connect with Kerberos V5 and provide encryption service OR Unable to connect with Kerberos V5, using normal rlogin |
A Kerberized session could not be established with the appropriate service (kshell for rsh and rcp, eklogin or klogin for rlogin) on the server. This may be due to invalid credentials.
Make sure your credentials are valid. Destroy your tickets with kdestroy and create new tickets with kinit.
Make sure the target host has a keytab with the correct version of the service key. Use kadmin(1M) to view the key version number of the service principal (for example, host/FQDN_hostname) in the Kerberos database and use klist -k on the target host to make sure it has the same key version number.
Make sure there are entries for the services (klogin, eklogin, and kshell) in /etc/inetd.conf on the target host.
Unable to securely authenticate user ... exit |
Authentication could not be negotiated with the server.
Start authentication debugging by invoking the telnet command toggle authdebug and look at the debug messages for further clues. Also, make sure you have valid credentials.
Wrong principal in request |
There was an invalid principal name in the ticket. It may be a DNS or FQDN problem.
Make sure the principal of the service matches the principal in the ticket.
You are using an old Kerberos5 client without checksum support; only newer clients are authorized. |
Authentication with checksum was not negotiated with the client. The client may be using an old Kerberos V5 protocol that does not support initial connection support.
Make sure the client is using a Kerberos V5 protocol that supports initial connection support.