I have a Kerberos problem with a Linux host connecting to a Windows KDC. I suspect that Kerberos key with the wrong version is to blame.
One way to be shure would be to delete the SPN and create it anew, but this is in a production environment and I must debug in "read-only", if you will.
How can I retreive the current Kerberos KVNO from a principal in Active Directory ?
With PowerShell's AD Cmdlets it's possible to query for kvno:
I'm incredulous as to whether KVNO has anything to do with your problem, OK maybe with Linux clients, but anyway, use Wireshark/Network Monitor:Key Version Numbers are described in MS-KILE section 3.1.5.8.
By the way, Mathias R. Jessen is correct in that in that Windows typically ignores KVNOs. But they are still implemented in an RFC-complaint way.
https://docs.microsoft.com/en-us/archive/blogs/openspecification/to-kvno-or-not-to-kvno-what-is-the-version
But the KVNO does have some significance in an RODC environment:
https://docs.microsoft.com/en-us/archive/blogs/openspecification/notes-on-kerberos-kvno-in-windows-rodc-environment
Some more info here: https://web.archive.org/web/20150204183217/http://support.microsoft.com/kb/2716037
On linux you can use kvno command to retreive it from KDC
Query from a AD joined linux server:
replace HOSTNAME with your hostname.
my team has had to work through this before and we found the following works on some Linux systems to get the KVNO number:
Of course, you can replace the
$USER
with an actual user needed.I don't know what your specific fix was for this problem, for me I found the another error mentioning pam couldn't work out the domain from the hostname. When I checked the /etc/hosts file wasn't consistent with the hostname set via hostnamectl.
Would have thought this would have affected the problem, but it starting behaving after I set this.