<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Kerberos Checksum error in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-Checksum-error/m-p/209235#M171191</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I am having trouble with beeline on hiveserver2 direct mode, kerberos is spitting Mechanism level: Checksum failed error&lt;/P&gt;&lt;P&gt;In my krb5.conf I got the tgs and tkt encryption entries as follows:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;#default_tgs_enctypes = aes des3-cbc-sha1 rc4 des-cbc-md5 &lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;  #default_tkt_enctypes = aes des3-cbc-sha1 rc4 des-cbc-md5&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;listing master keys is as follows:&lt;/P&gt;&lt;P&gt;root@hmaster:~# &lt;STRONG&gt;kdb5_util list_mkeys&lt;/STRONG&gt; &lt;/P&gt;&lt;P&gt;Master keys for Principal: K/M@xxxx.LOCAL &lt;/P&gt;&lt;P&gt;KVNO: 1, Enctype: &lt;STRONG&gt;des3-cbc-sha1&lt;/STRONG&gt;, Active on: Thu Jan 01 01:00:00 BST 1970 *&lt;/P&gt;&lt;P&gt;getprinc output shows it is using AES-256 encryption&lt;/P&gt;&lt;P&gt;kadmin.local:  &lt;STRONG&gt;getprinc hive/hdata1.xxxx.local@xxxx.LOCAL&lt;/STRONG&gt; &lt;/P&gt;&lt;P&gt;Principal: hive/hdata1.xxxx.local@xxxx.LOCAL &lt;/P&gt;&lt;P&gt;Expiration date: [never]
Last password change: Fri Nov 24 21:01:55 GMT 2017 &lt;/P&gt;&lt;P&gt;Password expiration date: [none] &lt;/P&gt;&lt;P&gt;Maximum ticket life: 0 days 10:00:00 &lt;/P&gt;&lt;P&gt;Maximum renewable life: 7 days 00:00:00 &lt;/P&gt;&lt;P&gt;Last modified: Fri Nov 24 21:01:55 GMT 2017 (admin/admin@xxxx.LOCAL) &lt;/P&gt;&lt;P&gt;Last successful authentication: Sat Nov 25 22:17:56 GMT 2017 &lt;/P&gt;&lt;P&gt;Last failed authentication: [never]
Failed password attempts: 0 &lt;/P&gt;&lt;P&gt;Number of keys: 8 &lt;/P&gt;&lt;P&gt;Key: vno 1, aes256-cts-hmac-sha1-96, no salt &lt;/P&gt;&lt;P&gt;Key: vno 1, arcfour-hmac, no salt &lt;/P&gt;&lt;P&gt;Key: vno 1, des3-cbc-sha1, no salt &lt;/P&gt;&lt;P&gt;Key: vno 1, des-cbc-crc, no salt &lt;/P&gt;&lt;P&gt;Key: vno 1, des-cbc-md5, Version 4 &lt;/P&gt;&lt;P&gt;Key: vno 1, des-cbc-md5, Version 5 - No Realm &lt;/P&gt;&lt;P&gt;Key: vno 1, des-cbc-md5, Version 5 - Realm Only &lt;/P&gt;&lt;P&gt;Key: vno 1, des-cbc-md5, AFS version 3 &lt;/P&gt;&lt;P&gt;MKey: vno 1 &lt;/P&gt;&lt;P&gt;Attributes: REQUIRES_PRE_AUTH &lt;/P&gt;&lt;P&gt;Policy: [none]
kadmin.local:&lt;/P&gt;&lt;P&gt;Is this normal that kdb is listing only one masterkey of des3 encryption and service principal is using AES-256&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;MB&lt;/P&gt;</description>
    <pubDate>Sun, 26 Nov 2017 06:53:32 GMT</pubDate>
    <dc:creator>baig_mujeeb</dc:creator>
    <dc:date>2017-11-26T06:53:32Z</dc:date>
  </channel>
</rss>

