Displaying 2 results from an estimated 2 matches for "gensec_gse_client_prepare_ccach".
Did you mean:
gensec_gse_client_prepare_ccache
2024 Dec 31
2
ef205f6b52e "s3:gse: get an explicit ccache_name" breaks kerberos auth in smbclient
...but we'll remove the kinit from the callers soon.
Before this one (using kinit):
$ smbclient -U mjt at TLS.MSK.RU -N //tsrv/mjt
Try "help" to get a list of possible commands.
smb: \>
After this commit:
$ smbclient -U mjt at TLS.MSK.RU -N //tsrv/mjt -d5
...
gensec_gse_client_prepare_ccache: No password for user principal[mjt at TLS.MSK.RU]
Failed to start GENSEC client mech gse_krb5: NT_STATUS_INVALID_PARAMETER
...
session setup failed: NT_STATUS_LOGON_FAILURE
This is still happening in current master.
I guess this wasn't an intended behavior :)
Thanks,
/mjt
2025 Jan 01
1
ef205f6b52e "s3:gse: get an explicit ccache_name" breaks kerberos auth in smbclient
...t;
> Before this one (using kinit):
>
> ? $ smbclient -U mjt at TLS.MSK.RU -N //tsrv/mjt
> ? Try "help" to get a list of possible commands.
> ? smb: \>
>
> After this commit:
>
> ? $ smbclient -U mjt at TLS.MSK.RU -N //tsrv/mjt -d5
> ? ...
> ? gensec_gse_client_prepare_ccache: No password for user principal[mjt at TLS.MSK.RU]
> ? Failed to start GENSEC client mech gse_krb5: NT_STATUS_INVALID_PARAMETER
> ? ...
> ? session setup failed: NT_STATUS_LOGON_FAILURE
>
> This is still happening in current master.
>
> I guess this wasn't an intended...