<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: SOLR + Kerberos + curl ==&amp;gt; Cannot find key of appropriate type to decrypt AP REP... in Archives of Support Questions (Read Only)</title>
    <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/SOLR-Kerberos-curl-gt-Cannot-find-key-of-appropriate-type-to/m-p/54208#M60089</link>
    <description>After you get the ticket what is the output of klist -ef? That will show the ticket you have and encryption type provided by the KDC that issued the ticket.</description>
    <pubDate>Thu, 27 Apr 2017 15:56:37 GMT</pubDate>
    <dc:creator>mbigelow</dc:creator>
    <dc:date>2017-04-27T15:56:37Z</dc:date>
    <item>
      <title>SOLR + Kerberos + curl ==&gt; Cannot find key of appropriate type to decrypt AP REP...</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/SOLR-Kerberos-curl-gt-Cannot-find-key-of-appropriate-type-to/m-p/54188#M60088</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I setup a mini-CDH-5.9 cluster and enabled Kerberos.&lt;/P&gt;&lt;P&gt;Working with HDFS, Hive, Hbase is working fine, the only issue is that I cannot access my SOLR collection via curl command-line. Accessing SOLR collection via Hue is also working.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I execute e.g. &amp;nbsp;&lt;/P&gt;&lt;PRE&gt;curl --negotiate -u : 'http://mgr-node1:8983/solr/mycollection/select?q=*&amp;amp;wt=json&amp;amp;indent=true'&lt;/PRE&gt;&lt;P&gt;after grabbing a Kerberos ticket , I receive the error:&lt;/P&gt;&lt;PRE&gt;HTTP Status 403 - GSSException: Failure unspecified at GSS-API level (Mechanism level: Invalid argument (400) - Cannot find key of appropriate type to decrypt AP REP - AES256 CTS mode with HMAC SHA1-96)&lt;/PRE&gt;&lt;P&gt;But this enctype is included in the keytab, as well as the supported enctypes in the MIT-KDC:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Keytab:&lt;/P&gt;&lt;PRE&gt;klist -e -kt /etc/security/cloudera-scm.keytab
Keytab name: FILE:/etc/security/cloudera-scm.keytab
KVNO Timestamp           Principal
---- ------------------- ------------------------------------------------------
   1 04/26/2017 21:21:22 cloudera-scm@realm.demo (aes256-cts-hmac-sha1-96)
   1 04/26/2017 21:21:22 cloudera-scm@realm.demo (aes128-cts-hmac-sha1-96)
   1 04/26/2017 21:21:22 cloudera-scm@realm.demo (des3-cbc-sha1)
   1 04/26/2017 21:21:22 cloudera-scm@realm.demo (arcfour-hmac)
   1 04/26/2017 21:21:22 cloudera-scm@realm.demo (des-hmac-sha1)
   1 04/26/2017 21:21:22 cloudera-scm@realm.demo (des-cbc-md5)&lt;/PRE&gt;&lt;P&gt;KDC supported enctypes:&lt;/P&gt;&lt;PRE&gt;sudo cat /var/kerberos/krb5kdc/kdc.conf | grep supported_enctypes
  supported_enctypes = aes256-cts-hmac-sha1-96 des3-hmac-sha1 aes256-cts arcfour-hmac des-hmac-sha1&lt;/PRE&gt;&lt;P&gt;Krb client config:&lt;/P&gt;&lt;PRE&gt;cat /etc/krb5.conf | grep _enctypes
default_tgs_enctypes = aes256-cts-hmac-sha1-96 des3-hmac-sha1 aes256-cts arcfour-hmac des-hmac-sha1
default_tkt_enctypes = aes256-cts-hmac-sha1-96 des3-hmac-sha1 aes256-cts arcfour-hmac des-hmac-sha1
permitted_enctypes = aes256-cts-hmac-sha1-96 des3-hmac-sha1 aes256-cts arcfour-hmac des-hmac-sha1&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any ideas where the error is coming from ?&lt;/P&gt;&lt;P&gt;How to troubleshoot further, so that I can access the collection via curl, e.g. to index new data...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance...&lt;/P&gt;</description>
      <pubDate>Fri, 16 Sep 2022 11:31:09 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/SOLR-Kerberos-curl-gt-Cannot-find-key-of-appropriate-type-to/m-p/54188#M60088</guid>
      <dc:creator>geko</dc:creator>
      <dc:date>2022-09-16T11:31:09Z</dc:date>
    </item>
    <item>
      <title>Re: SOLR + Kerberos + curl ==&gt; Cannot find key of appropriate type to decrypt AP REP...</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/SOLR-Kerberos-curl-gt-Cannot-find-key-of-appropriate-type-to/m-p/54208#M60089</link>
      <description>After you get the ticket what is the output of klist -ef? That will show the ticket you have and encryption type provided by the KDC that issued the ticket.</description>
      <pubDate>Thu, 27 Apr 2017 15:56:37 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/SOLR-Kerberos-curl-gt-Cannot-find-key-of-appropriate-type-to/m-p/54208#M60089</guid>
      <dc:creator>mbigelow</dc:creator>
      <dc:date>2017-04-27T15:56:37Z</dc:date>
    </item>
    <item>
      <title>Re: SOLR + Kerberos + curl ==&gt; Cannot find key of appropriate type to decrypt AP REP...</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/SOLR-Kerberos-curl-gt-Cannot-find-key-of-appropriate-type-to/m-p/54228#M60090</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/18127"&gt;@mbigelow&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;many thanks for your reply.&lt;/P&gt;&lt;P&gt;Here the output :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;## as user cloudera-scm:&lt;BR /&gt;&lt;BR /&gt;-bash-4.2$ klist -ef
Ticket cache: FILE:/tmp/krb5cc_995
Default principal: cloudera-scm@realm.demo

Valid starting       Expires              Service principal
04/28/2017 06:08:22  04/29/2017 06:08:22  krbtgt/realm.demo@realm.demo
        renew until 05/05/2017 06:08:22, Flags: FRI
        Etype (skey, tkt): aes256-cts-hmac-sha1-96, aes256-cts-hmac-sha1-96&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;any ideas ?&lt;/P&gt;</description>
      <pubDate>Fri, 28 Apr 2017 06:12:37 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/SOLR-Kerberos-curl-gt-Cannot-find-key-of-appropriate-type-to/m-p/54228#M60090</guid>
      <dc:creator>geko</dc:creator>
      <dc:date>2017-04-28T06:12:37Z</dc:date>
    </item>
    <item>
      <title>Re: SOLR + Kerberos + curl ==&gt; Cannot find key of appropriate type to decrypt AP REP...</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/SOLR-Kerberos-curl-gt-Cannot-find-key-of-appropriate-type-to/m-p/54240#M60091</link>
      <description>&lt;P&gt;at the end it turned out not to be a enctype issue &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The problem was that the hostname of the solr server in the curl URL did not match the hostname part of solr's kerberos principal.&lt;/P&gt;&lt;P&gt;After putting the FQDN in the call:&lt;/P&gt;&lt;PRE&gt;curl --negotiate -u : 'http://mgr-node1.test.demo:8983.........&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the error disappeard and everything works nice.&lt;/P&gt;</description>
      <pubDate>Fri, 28 Apr 2017 18:00:41 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/SOLR-Kerberos-curl-gt-Cannot-find-key-of-appropriate-type-to/m-p/54240#M60091</guid>
      <dc:creator>geko</dc:creator>
      <dc:date>2017-04-28T18:00:41Z</dc:date>
    </item>
  </channel>
</rss>

