kerberos

Apache seg fault. krb5int_key_delete Assertion destructors_set[keynum] == 1 failed

随声附和 提交于 2021-01-29 15:55:26
问题 I use Apache 2.4.10 and Debian 8. I installed apache and most packages with apt. For long time all was good, but suddenly we started to receive seg fault. [Wed Jan 02 00:55:19.233027 2019] [mpm_prefork:notice] [pid 25161] AH00171: Graceful restart requested, doing restart apache2: ../../../src/util/support/threads.c:383: krb5int_key_delete: Assertion `destructors_set[keynum] == 1' failed. [Wed Jan 02 00:55:19.326118 2019] [core:notice] [pid 25161] AH00060: seg fault or similar nasty error

Waffle SSPI Kerberos Single Sign On: Configuring the Encryption Ciphers, and Debugging

ぐ巨炮叔叔 提交于 2021-01-29 09:02:25
问题 How can we configure which Encryption Ciphers a Java Waffle SSPI Kerberos Single Sign On (SSO) client should use? How can we best debug which ciphers are actually being used by the client and server? Background We need to restrict the Encryption Ciphers used for Kerberos SSO, removing ciphers now considered weak. Our Setup The Java Application Server implements SSO via pure Java GSSAPI. The Java Client implements SSO by two configurable SSO APIs: On Linux or Windows 10 without Credential

How do I see the debug information generated by the -Dsun.security.krb5.debug JVM option?

点点圈 提交于 2021-01-28 02:03:10
问题 I'm running a JAR with the option -Dsun.security.krb5.debug=true . How and where do I see the debug information generated? 回答1: This is a parameter for JVM. It usually goes with -Dsun.security.jgss.debug=true Afterwards, to see debug lines, perform any JGSS/Kerberos operation, for example those described in tutorial: http://docs.oracle.com/javase/7/docs/technotes/guides/security/jgss/tutorials/. Debug information is written to console. To see it you can either start jar from console java -jar

CentOS普通用户添加管理员权限

老子叫甜甜 提交于 2021-01-22 21:11:18
CentOS普通用户添加管理员权限 1、添加用户,首先用adduser命令添加一个普通用户,命令如下: #adduser keaising//添加一个名为keaising的用户 #passwd ljl //修改密码 Changing password for user keaising. New UNIX password: //在这里输入新密码 Retype new UNIX password: //再次输入新密码 passwd: all authentication tokens updated successfully. 2、赋予root权限 方法一: 修改 /etc/sudoers 文件,找到下面一行,把前面的注释(#)去掉,最终结果为: ## Allows people in group wheel to run all commands %wheel ALL=(ALL) ALL 然后修改用户,使其属于root组(wheel),命令如下: #usermod -g root keaising 修改完毕,现在可以用keaising帐号登录,然后用命令 su – ,即可获得root权限进行操作。 方法二: 修改 /etc/sudoers 文件,找到下面一行,在root下面添加一行,如下所示: ## Allow root to run any commands anywhere

How to install kerberos client in docker?

时间秒杀一切 提交于 2021-01-22 07:09:23
问题 I am trying to create Docker image by next Dockerfile . It must to install Kerberos client. Dockerfile : FROM node:latest RUN export DEBIAN_FRONTEND=noninteractive RUN apt-get -qq update RUN apt-get -qq install krb5-user libpam-krb5 RUN apt-get -qq clean COPY / ./ EXPOSE 3000 CMD ["npm", "start"] Next command RUN apt-get -qq install krb5-user libpam-krb5 from Dockerfile ask me to enter the value to interactive prompt which looks like: Default Kerberos version 5 realm: The point is that the

How to install kerberos client in docker?

邮差的信 提交于 2021-01-22 07:07:55
问题 I am trying to create Docker image by next Dockerfile . It must to install Kerberos client. Dockerfile : FROM node:latest RUN export DEBIAN_FRONTEND=noninteractive RUN apt-get -qq update RUN apt-get -qq install krb5-user libpam-krb5 RUN apt-get -qq clean COPY / ./ EXPOSE 3000 CMD ["npm", "start"] Next command RUN apt-get -qq install krb5-user libpam-krb5 from Dockerfile ask me to enter the value to interactive prompt which looks like: Default Kerberos version 5 realm: The point is that the

How to install kerberos client in docker?

笑着哭i 提交于 2021-01-22 07:07:33
问题 I am trying to create Docker image by next Dockerfile . It must to install Kerberos client. Dockerfile : FROM node:latest RUN export DEBIAN_FRONTEND=noninteractive RUN apt-get -qq update RUN apt-get -qq install krb5-user libpam-krb5 RUN apt-get -qq clean COPY / ./ EXPOSE 3000 CMD ["npm", "start"] Next command RUN apt-get -qq install krb5-user libpam-krb5 from Dockerfile ask me to enter the value to interactive prompt which looks like: Default Kerberos version 5 realm: The point is that the

presto集成kerberos以及访问集成了kerberos的hive集群

坚强是说给别人听的谎言 提交于 2021-01-12 04:36:19
1、 创建主体 注: 192.168.0.230 为单节点集群 192.168.4.50 为 kdc 服务器 192.168.0.9 为客户端 1.1、 Kdc 服务器创建主体 # kadmin.local -q ‘addprinc -randkey presto’ #kadmin.local -q ‘addprinc -randkey presto/yjt’ 1.2、 创建秘钥文件 # kadmin.local -q ‘xst -norandkey -k presto.keytab presto presto/yjt hive/yjt nn/yjt’ 上述的 hive/yjt 和 nn/yjt 两个认证用户也需要添加到秘钥表, hive/yjt 用于 presto 连接 hive 集群时使用, nn/yjt 用户操作 hdfs 时使用 1.3、 分发秘钥文件 # scp presto.keytab 192.168.0.230:/data1/hadoop/presto 如下操作在集群 # chmod 444 /data1/hadoop/presto/presto.keytab 1.4、 生成 keystore 文件 在 presto 主节点生成 keystore # keytool -genkeypair -alias localhost -keyalg RSA -keystore

Do web.config header size limits override http.sys limits in the registry?

霸气de小男生 提交于 2021-01-01 04:28:45
问题 I have an ASP.Net 4.0 application using Windows Integrated Authentication on IIS7.5 on Windows 2003. Some users are reporting errors with this message: Bad Request - Request Too Long HTTP Error 400. The size of the request headers is too long. Others succeed in loading pages but have errors loading other resources and performing AJAX calls. One of the users experiencing intermittent errors has a Kerberos Authorization header of about 5700 characters. This user is a member of 250 AD groups. My

Do web.config header size limits override http.sys limits in the registry?

一个人想着一个人 提交于 2021-01-01 04:27:06
问题 I have an ASP.Net 4.0 application using Windows Integrated Authentication on IIS7.5 on Windows 2003. Some users are reporting errors with this message: Bad Request - Request Too Long HTTP Error 400. The size of the request headers is too long. Others succeed in loading pages but have errors loading other resources and performing AJAX calls. One of the users experiencing intermittent errors has a Kerberos Authorization header of about 5700 characters. This user is a member of 250 AD groups. My