你好,
自neoload 9.2到2023.1的迁移,调用url不再要求Kerberso认证工作
即使测试工具jre \ bin \ java jar bin \ \ kerberos-tester-1.0.1-all工具。jar它不工作了
调试是真的storeKey假useTicketCache假useKeyTab假doNotPrompt假ticketCache是null isInitiator真正的KeyTab零refreshKrb5Config假主要是null tryFirstPass是假useFirstPass是错误的对于storePass是假clearPass是错误的
给用户名和密码进行谈判
(Krb5LoginModule)用户输入用户名:XXXXX
> > > KdcAccessibility:重置
(Krb5LoginModule)身份验证失败
不支持默认etyp default_tkt_enctypes
支持不启动谈判,如果允许将回退到其他方案。原因:
GSSException:没有提供有效身份证件(机制水平:没有提供有效身份证件(机制层面:为了获得新的启动凭证失败!(空)))
在java.security.jgss / sun.security.jgss.spnego.SpNegoContext。initSecContext(未知来源)
在java.security.jgss / sun.security.jgss.GSSContextImpl。initSecContext(未知来源)
在java.security.jgss / sun.security.jgss.GSSContextImpl。initSecContext(未知来源)
在java.security.jgss / sun.net.www.protocol.http.spnego.NegotiatorImpl.init(未知来源)
在java.security.jgss / sun.net.www.protocol.http.spnego.NegotiatorImpl。< init >(未知来源)
在java.base / jdk.internal.reflect.NativeConstructorAccessorImpl.newInstance0(本地方法)
在java.base / jdk.internal.reflect.NativeConstructorAccessorImpl.newInstance(未知来源)
在java.base / jdk.internal.reflect.DelegatingConstructorAccessorImpl.newInstance(未知来源)
在java.base / java.lang.reflect.Constructor。newInstance(未知源)
(最初要求和解决支持中心)
最佳答案社区管理员
It means that 16 and 23 are not part in the default anymore. Looking on the Internet this is for \"des3-cbc-sha1-kd\" and \"rc4-hmac\". Both are deprecated.<\/p>
I'm not able to confirm if one of them has been used by 9.2.1 but maybe you could check directly on the machine using the \"klist -e\" command to check the encryption used. Then this could be \"forced\" in your krb5.conf.<\/p>
You can also force with the two missing encryption in 2023 to check if it makes any difference like :<\/p>
default_tgs_enctypes = des3-cbc-sha1-kd aes128-cts-hmac-sha1-96 rc4-hmac<\/p>
Another way to check would be to capture the traffic.<\/p>
You should open a support ticket if this information does not help since it seems tricky.<\/p>
Thanks<\/p>","className":"post__content__best_answer"}">