<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: Cloudera - Kerberos GSS initiate failed in Archives of Support Questions (Read Only)</title>
    <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudera-Kerberos-GSS-initiate-failed/m-p/78859#M75904</link>
    <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/12222"&gt;@vijithv&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;First, firewalls can easily block UDP and allow TCP.&amp;nbsp; I mentioned that was a possible cause.&lt;/P&gt;&lt;P&gt;Also, depending on how you have your /etc/krb5.conf configured, a different KDC could have been contacted.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can see distinctly in the failure via UDP that there is a socket timeout for each attempt to connect to the KDC.&amp;nbsp; This is a failure at the networking side where a client cannot connect to a server.&amp;nbsp; Since no connection was ever made via UDP, there was no change for it to know to try TCP.&amp;nbsp; That "switching" is done based on a response of KRB5KRB_ERR_RESPONSE_TOO_BIG I believe so if no response is made, no "switching" to TCP will occur.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you really want to get to the bottom of this, recreate the problem while capturing packets via tcpdump like this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;# tcpdump -i any -w ~/kerberos_broken.pcap port 88&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then, with the problem fixed reproduce again while capturing packets:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;# tcpdump -i any -w ~/kerberos_fixed.pcap port 88&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Use Wireshark (it does a great job of decoding Kerberos packets) and you will be able to see the entire interaction.&lt;/P&gt;&lt;P&gt;This will show us information to help determine the cause.&lt;/P&gt;&lt;P&gt;Wireshark is here:&amp;nbsp; &lt;A href="https://www.wireshark.org/" target="_blank"&gt;https://www.wireshark.org/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 23 Aug 2018 06:43:12 GMT</pubDate>
    <dc:creator>bgooley</dc:creator>
    <dc:date>2018-08-23T06:43:12Z</dc:date>
    <item>
      <title>Cloudera - Kerberos GSS initiate failed</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudera-Kerberos-GSS-initiate-failed/m-p/65429#M75891</link>
      <description>&lt;P&gt;Hello Guys,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm having some problems with Cloudera and Kerberos configuration. After enabling the Kerberos authentication in Cloudera's manager, i'm not able to issue the "hdfs" command.&lt;/P&gt;
&lt;P&gt;The ticket was generated succesfully, but i'm receiving the error below:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any help would be apreciated.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks in advance!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;[root@cpsmaaeip04 ~]# kinit -kt hdfs.keytab hdfs/cpsmaaeip04.cpfl.com.br@HADOOP.EMETER.COM&lt;BR /&gt;[root@cpsmaaeip04 ~]# klist&lt;BR /&gt;Ticket cache: FILE:/tmp/krb5cc_0&lt;BR /&gt;Default principal: hdfs/cpsmaaeip04.cpfl.com.br@HADOOP.EMETER.COM&lt;/P&gt;
&lt;P&gt;Valid starting Expires Service principal&lt;BR /&gt;03/15/2018 16:19:10 03/16/2018 16:19:10 krbtgt/HADOOP.EMETER.COM@HADOOP.EMETER.COM&lt;BR /&gt;renew until 03/20/2018 16:19:10&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;[root@cpsmaaeip04 ~]# hdfs dfs -ls /&lt;BR /&gt;18/03/15 16:20:04 WARN security.UserGroupInformation: PriviledgedActionException as:hdfs/cpsmaaeip04.cpfl.com.br@HADOOP.EMETER.COM (auth:KERBEROS) cause:org.apache.hadoop.ipc.RemoteException(javax.security.sasl.SaslException): GSS initiate failed&lt;BR /&gt;18/03/15 16:20:07 WARN security.UserGroupInformation: PriviledgedActionException as:hdfs/cpsmaaeip04.cpfl.com.br@HADOOP.EMETER.COM (auth:KERBEROS) cause:org.apache.hadoop.ipc.RemoteException(javax.security.sasl.SaslException): GSS initiate failed&lt;BR /&gt;18/03/15 16:20:07 WARN security.UserGroupInformation: Not attempting to re-login since the last re-login was attempted less than 600 seconds seconds before. Last Login=1521141604562&lt;BR /&gt;18/03/15 16:20:11 WARN security.UserGroupInformation: PriviledgedActionException as:hdfs/cpsmaaeip04.cpfl.com.br@HADOOP.EMETER.COM (auth:KERBEROS) cause:org.apache.hadoop.ipc.RemoteException(javax.security.sasl.SaslException): GSS initiate failed&lt;BR /&gt;18/03/15 16:20:11 WARN security.UserGroupInformation: Not attempting to re-login since the last re-login was attempted less than 600 seconds seconds before. Last Login=1521141604562&lt;BR /&gt;18/03/15 16:20:13 WARN security.UserGroupInformation: PriviledgedActionException as:hdfs/cpsmaaeip04.cpfl.com.br@HADOOP.EMETER.COM (auth:KERBEROS) cause:org.apache.hadoop.ipc.RemoteException(javax.security.sasl.SaslException): GSS initiate failed&lt;BR /&gt;18/03/15 16:20:13 WARN security.UserGroupInformation: Not attempting to re-login since the last re-login was attempted less than 600 seconds seconds before. Last Login=1521141604562&lt;BR /&gt;18/03/15 16:20:14 WARN security.UserGroupInformation: PriviledgedActionException as:hdfs/cpsmaaeip04.cpfl.com.br@HADOOP.EMETER.COM (auth:KERBEROS) cause:org.apache.hadoop.ipc.RemoteException(javax.security.sasl.SaslException): GSS initiate failed&lt;BR /&gt;18/03/15 16:20:14 WARN security.UserGroupInformation: Not attempting to re-login since the last re-login was attempted less than 600 seconds seconds before. Last Login=1521141604562&lt;BR /&gt;18/03/15 16:20:14 WARN security.UserGroupInformation: PriviledgedActionException as:hdfs/cpsmaaeip04.cpfl.com.br@HADOOP.EMETER.COM (auth:KERBEROS) cause:org.apache.hadoop.ipc.RemoteException(javax.security.sasl.SaslException): GSS initiate failed&lt;BR /&gt;18/03/15 16:20:14 WARN ipc.Client: Couldn't setup connection for hdfs/cpsmaaeip04.cpfl.com.br@HADOOP.EMETER.COM to cpsmaaeip04.cpfl.com.br/10.50.152.51:8020&lt;BR /&gt;org.apache.hadoop.ipc.RemoteException(javax.security.sasl.SaslException): GSS initiate failed&lt;BR /&gt;at org.apache.hadoop.security.SaslRpcClient.saslConnect(SaslRpcClient.java:375)&lt;BR /&gt;at org.apache.hadoop.ipc.Client$Connection.setupSaslConnection(Client.java:560)&lt;BR /&gt;at org.apache.hadoop.ipc.Client$Connection.access$1900(Client.java:375)&lt;BR /&gt;at org.apache.hadoop.ipc.Client$Connection$2.run(Client.java:730)&lt;BR /&gt;at org.apache.hadoop.ipc.Client$Connection$2.run(Client.java:726)&lt;BR /&gt;at java.security.AccessController.doPrivileged(Native Method)&lt;BR /&gt;at javax.security.auth.Subject.doAs(Subject.java:415)&lt;BR /&gt;at org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1693)&lt;BR /&gt;at org.apache.hadoop.ipc.Client$Connection.setupIOstreams(Client.java:725)&lt;BR /&gt;at org.apache.hadoop.ipc.Client$Connection.access$2900(Client.java:375)&lt;BR /&gt;at org.apache.hadoop.ipc.Client.getConnection(Client.java:1524)&lt;BR /&gt;at org.apache.hadoop.ipc.Client.call(Client.java:1447)&lt;BR /&gt;at org.apache.hadoop.ipc.Client.call(Client.java:1408)&lt;BR /&gt;at org.apache.hadoop.ipc.ProtobufRpcEngine$Invoker.invoke(ProtobufRpcEngine.java:230)&lt;BR /&gt;at com.sun.proxy.$Proxy14.getFileInfo(Unknown Source)&lt;BR /&gt;at org.apache.hadoop.hdfs.protocolPB.ClientNamenodeProtocolTranslatorPB.getFileInfo(ClientNamenodeProtocolTranslatorPB.java:762)&lt;BR /&gt;at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)&lt;BR /&gt;at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:57)&lt;BR /&gt;at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)&lt;BR /&gt;at java.lang.reflect.Method.invoke(Method.java:606)&lt;BR /&gt;at org.apache.hadoop.io.retry.RetryInvocationHandler.invokeMethod(RetryInvocationHandler.java:256)&lt;BR /&gt;at org.apache.hadoop.io.retry.RetryInvocationHandler.invoke(RetryInvocationHandler.java:104)&lt;BR /&gt;at com.sun.proxy.$Proxy15.getFileInfo(Unknown Source)&lt;BR /&gt;at org.apache.hadoop.hdfs.DFSClient.getFileInfo(DFSClient.java:2102)&lt;BR /&gt;at org.apache.hadoop.hdfs.DistributedFileSystem$19.doCall(DistributedFileSystem.java:1215)&lt;BR /&gt;at org.apache.hadoop.hdfs.DistributedFileSystem$19.doCall(DistributedFileSystem.java:1211)&lt;BR /&gt;at org.apache.hadoop.fs.FileSystemLinkResolver.resolve(FileSystemLinkResolver.java:81)&lt;BR /&gt;at org.apache.hadoop.hdfs.DistributedFileSystem.getFileStatus(DistributedFileSystem.java:1211)&lt;BR /&gt;at org.apache.hadoop.fs.Globber.getFileStatus(Globber.java:64)&lt;BR /&gt;at org.apache.hadoop.fs.Globber.doGlob(Globber.java:285)&lt;BR /&gt;at org.apache.hadoop.fs.Globber.glob(Globber.java:151)&lt;BR /&gt;at org.apache.hadoop.fs.FileSystem.globStatus(FileSystem.java:1637)&lt;BR /&gt;at org.apache.hadoop.fs.shell.PathData.expandAsGlob(PathData.java:326)&lt;BR /&gt;at org.apache.hadoop.fs.shell.Command.expandArgument(Command.java:235)&lt;BR /&gt;at org.apache.hadoop.fs.shell.Command.expandArguments(Command.java:218)&lt;BR /&gt;at org.apache.hadoop.fs.shell.FsCommand.processRawArguments(FsCommand.java:102)&lt;BR /&gt;at org.apache.hadoop.fs.shell.Command.run(Command.java:165)&lt;BR /&gt;at org.apache.hadoop.fs.FsShell.run(FsShell.java:315)&lt;BR /&gt;at org.apache.hadoop.util.ToolRunner.run(ToolRunner.java:70)&lt;BR /&gt;at org.apache.hadoop.util.ToolRunner.run(ToolRunner.java:84)&lt;BR /&gt;at org.apache.hadoop.fs.FsShell.main(FsShell.java:372)&lt;BR /&gt;18/03/15 16:20:14 WARN security.UserGroupInformation: PriviledgedActionException as:hdfs/cpsmaaeip04.cpfl.com.br@HADOOP.EMETER.COM (auth:KERBEROS) cause:java.io.IOException: Couldn't setup connection for hdfs/cpsmaaeip04.cpfl.com.br@HADOOP.EMETER.COM to cpsmaaeip04.cpfl.com.br/10.50.152.51:8020&lt;BR /&gt;ls: Failed on local exception: java.io.IOException: Couldn't setup connection for hdfs/cpsmaaeip04.cpfl.com.br@HADOOP.EMETER.COM to cpsmaaeip04.cpfl.com.br/10.50.152.51:8020; Host Details : local host is: "cpsmaaeip04.cpfl.com.br/10.50.152.51"; destination host is: "cpsmaaeip04.cpfl.com.br":8020;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Mar 2018 21:11:18 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudera-Kerberos-GSS-initiate-failed/m-p/65429#M75891</guid>
      <dc:creator>Gabre</dc:creator>
      <dc:date>2018-03-15T21:11:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cloudera - Kerberos GSS initiate failed</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudera-Kerberos-GSS-initiate-failed/m-p/65472#M75892</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please check your host file - under /etc/hosts whether it includes FQDN or not ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;if not please add , this should fix the kerberos issue&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Mar 2018 16:56:31 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudera-Kerberos-GSS-initiate-failed/m-p/65472#M75892</guid>
      <dc:creator>csguna</dc:creator>
      <dc:date>2018-03-16T16:56:31Z</dc:date>
    </item>
    <item>
      <title>Re: Cloudera - Kerberos GSS initiate failed</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudera-Kerberos-GSS-initiate-failed/m-p/65486#M75893</link>
      <description>&lt;P&gt;Hello!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for replying!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, the /etc/hosts includes the FQDN. I checked the namenode logs and i noticed that the error below is occuring when i try to issue the HDFS command.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2018-03-16 16:01:11,323 WARN org.apache.hadoop.security.authentication.server.AuthenticationFilter: Authentication exception: GSSException: Failure unspecified at GSS-API level (Mechanism level: Specified version of key is not available (44))&lt;BR /&gt;2018-03-16 16:01:11,331 WARN org.apache.hadoop.security.authentication.server.AuthenticationFilter: Authentication exception: GSSException: Failure unspecified at GSS-API level (Mechanism level: Specified version of key is not available (44))&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have checked the KVNO number and the numbers match, with both at 16, as below:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[eip@cpsmaaeip04 .keytabs]$ klist -k hdfs.keytab&lt;BR /&gt;Keytab name: FILE:hdfs.keytab&lt;BR /&gt;KVNO Principal&lt;BR /&gt;---- --------------------------------------------------------------------------&lt;BR /&gt;16 hdfs/cpsmaaeip04.cpfl.com.br@HADOOP.EMETER.COM&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;[eip@cpsmaaeip04 .keytabs]$ kvno hdfs/cpsmaaeip04.cpfl.com.br@HADOOP.EMETER.COM&lt;BR /&gt;hdfs/cpsmaaeip04.cpfl.com.br@HADOOP.EMETER.COM: kvno = 16&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you guys have any clue about this issue?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;</description>
      <pubDate>Fri, 16 Mar 2018 19:06:26 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudera-Kerberos-GSS-initiate-failed/m-p/65486#M75893</guid>
      <dc:creator>Gabre</dc:creator>
      <dc:date>2018-03-16T19:06:26Z</dc:date>
    </item>
    <item>
      <title>Re: Cloudera - Kerberos GSS initiate failed</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudera-Kerberos-GSS-initiate-failed/m-p/65490#M75894</link>
      <description>&lt;P&gt;Please check if everything in KDC has been configured and all the processes of KDC master/slaves daemons are running.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Mar 2018 21:44:14 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudera-Kerberos-GSS-initiate-failed/m-p/65490#M75894</guid>
      <dc:creator>Krish216</dc:creator>
      <dc:date>2018-03-16T21:44:14Z</dc:date>
    </item>
    <item>
      <title>Re: Cloudera - Kerberos GSS initiate failed</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudera-Kerberos-GSS-initiate-failed/m-p/65491#M75895</link>
      <description>&lt;P&gt;I am having my own kerberos problem, but I thought I'd share this in case it solves your problem. Cloudera stores its own kerberos keytab in the runtime directory. See if you can authenticate against that keytab. If not, then your runtime keytab is not correct and you may have to redistribute the keytab. (requires shutdown of the roles)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the info you need:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) One a data node, the runtime keytab is located in&amp;nbsp;&lt;SPAN class="s1"&gt;/run/cloudera-scm-agent/process/XXX-DATANODE/, for example:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&lt;FONT color="#808000"&gt;&lt;SPAN class="s1"&gt;# pwd&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;FONT color="#808000"&gt;&lt;SPAN class="s1"&gt;/run/cloudera-scm-agent/process&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;FONT color="#808000"&gt;&lt;SPAN class="s1"&gt;# ls -l */hdfs.keytab&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;FONT color="#808000"&gt;&lt;SPAN class="s1"&gt;-rw------- 1 hdfs hdfs 1570 Mar 14 23:25 166-hdfs-DATANODE/hdfs.keytab&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;FONT color="#808000"&gt;&lt;SPAN class="s1"&gt;-rw------- 1 hdfs hdfs 1570 Mar 15 20:28 197-hdfs-DATANODE/hdfs.keytab&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;FONT color="#808000"&gt;&lt;SPAN class="s1"&gt;-rw------- 1 hdfs hdfs 1570 Mar 15 21:33 203-hdfs-DATANODE/hdfs.keytab&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;FONT color="#808000"&gt;&lt;SPAN class="s1"&gt;-rw------- 1 hdfs hdfs 1570 Mar 16 18:07 207-hdfs-DATANODE/hdfs.keytab&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;2) Use kinit to authenticate against the keytab.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&lt;FONT color="#808000"&gt;&lt;SPAN class="s1"&gt;# kinit -t hdfs.keytab user/host@realm&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;If you can successfully authenticate against that keytab, then your keytab is good. I hope this helps. If not, you'll have to &lt;A href="https://www.cloudera.com/documentation/enterprise/latest/topics/cm_sg_regen_kerb_princs.html" target="_self"&gt;redistribute the keytabs.&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Good luck.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Mar 2018 22:38:20 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudera-Kerberos-GSS-initiate-failed/m-p/65491#M75895</guid>
      <dc:creator>ramin</dc:creator>
      <dc:date>2018-03-16T22:38:20Z</dc:date>
    </item>
    <item>
      <title>Re: Cloudera - Kerberos GSS initiate failed</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudera-Kerberos-GSS-initiate-failed/m-p/65494#M75896</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/26378"&gt;@Gabre&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This error indicates that the server could not find a key to decrypt the Authentication request.&lt;/P&gt;&lt;P&gt;This can happen if the client requests a Service Ticket with a particular encryption type that the KDC has but the HDFS NameNode's keytab does not have that same encryption type.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Some things to check:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- &lt;STRONG&gt;/etc/krb5.conf&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;What encryption types do you have configured in libdefaults?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- run this on your active NameNode host:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;# klist -kte /var/run/cloudera-scm-agent/process/`ls -lrt /var/run/cloudera-scm-agent/process/ | awk '{print $9}' |grep NAMENODE| tail -1`/hdfs.keytab&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Note the encryption types.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The encryption types in the klist output are the only ones that can be used to decrypt.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To verify what encryption type is being requested and returned in the service ticket reply, you can add some debugging to your hdfs command like this:&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;# HADOOP_ROOT_LOGGER=TRACE,console HADOOP_JAAS_DEBUG=true HADOOP_OPTS="-Dsun.security.krb5.debug=true" hdfs dfs -ls /&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Mar 2018 22:59:06 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudera-Kerberos-GSS-initiate-failed/m-p/65494#M75896</guid>
      <dc:creator>bgooley</dc:creator>
      <dc:date>2018-03-16T22:59:06Z</dc:date>
    </item>
    <item>
      <title>Re: Cloudera - Kerberos GSS initiate failed</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudera-Kerberos-GSS-initiate-failed/m-p/65537#M75897</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/4054"&gt;@bgooley&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/26242"&gt;@ramin&lt;/a&gt;!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the help that you guys provided...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I solved the problem.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The problem is that the keytabs were being generated by cloudera in execution time... and i was trying to export the keytab of hdfs using&amp;nbsp;xst&amp;nbsp;-k hdfs.keytab hdfs/FQDN@HADOOP.EMETER.COM and it was changing the principal password! So when i tried to issue the "hdfs dfs -ls /" command, it tried to authenticate using a different password.&lt;/P&gt;&lt;P&gt;A workaround that i did is to copy the keytab that i need from&amp;nbsp;/var/run/cloudera-scm-agent/process/ to a directory, and use the same keytab generated by execution time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I read about that the "xst" command can be issue with the "-norandkey" parameter, preventing the principal not change the password. I tried to test this command with "-norandkey" but&amp;nbsp; i had a privilege problem:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;kadmin: Operation requires ``extract-keys'' privilege while changing&amp;nbsp;&lt;SPAN&gt;hdfs/&lt;/SPAN&gt;&lt;SPAN&gt;FQDN&lt;/SPAN&gt;&lt;SPAN&gt;@HADOOP.EMETER.COM's key.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;My kadm5.acl has full admin rights, as below:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;more kadm5.acl&lt;BR /&gt;*/admin@HADOOP.EMETER.COM *&lt;BR /&gt;cloudera-scm/admin@HADOOP.EMETER.COM admilc&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Do you guys know how to grant this&amp;nbsp;"extract-keys'' privilege&amp;nbsp;?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you very much!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Gabre.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 17 Mar 2018 19:34:43 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudera-Kerberos-GSS-initiate-failed/m-p/65537#M75897</guid>
      <dc:creator>Gabre</dc:creator>
      <dc:date>2018-03-17T19:34:43Z</dc:date>
    </item>
    <item>
      <title>Re: Cloudera - Kerberos GSS initiate failed</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudera-Kerberos-GSS-initiate-failed/m-p/65540#M75898</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/26378"&gt;@Gabre&lt;/a&gt;&amp;nbsp;I am glad that your problem is solved. A couple of things: 1) make sure you are using the MIT implementation of Kerberos. 2) It appears that granting extract priviliges need to be done explicitly for each user. (You can't use wildcard.) Please see &lt;A href="https://web.mit.edu/kerberos/krb5-latest/doc/admin/conf_files/kadm5_acl.html" target="_self"&gt;this&lt;/A&gt;, and note the paragraph that begins with "&lt;SPAN&gt;The&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="pre"&gt;extract&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;privilege is not included in the wildcard privilege".&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I just realized that you are missing the extract privilege in your ACL for the &lt;STRONG&gt;cloudera-scm&lt;/STRONG&gt; user. It appears that you need to change the ACL for cloudera admin from &lt;STRONG&gt;admilc&lt;/STRONG&gt; to &lt;STRONG&gt;admilce&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I hope that helps you. Cheers.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 18 Mar 2018 13:27:38 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudera-Kerberos-GSS-initiate-failed/m-p/65540#M75898</guid>
      <dc:creator>ramin</dc:creator>
      <dc:date>2018-03-18T13:27:38Z</dc:date>
    </item>
    <item>
      <title>Re: Cloudera - Kerberos GSS initiate failed</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudera-Kerberos-GSS-initiate-failed/m-p/65552#M75899</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/26242"&gt;@ramin&lt;/a&gt;!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for replying!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried to change the privilege from&amp;nbsp;admilc to&amp;nbsp;admilce, but it did not work. I searched the web for some kerberos documentation and i found this link below:&lt;/P&gt;&lt;P&gt;&lt;A href="https://web.mit.edu/kerberos/krb5-1.12/doc/admin/admin_commands/kadmin_local.html" target="_blank"&gt;https://web.mit.edu/kerberos/krb5-1.12/doc/admin/admin_commands/kadmin_local.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;"-norandkey&lt;/STRONG&gt;Do not randomize the keys. The keys and their version numbers stay unchanged. This option is only available in kadmin.local, and cannot be specified in combination with the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;-e&lt;/STRONG&gt;option."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It seems that its only available with kadmin.local, and it does not work with kadmin, i tried it and it worked!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;kadmin.local:&amp;nbsp; xst -norandkey -k hdfs.keytab hdfs/cpsmaaeip04.cpfl.com.br@HADOOP.EMETER.COM&lt;/P&gt;&lt;P&gt;Entry for principal hdfs/cpsmaaeip04.cpfl.com.br@HADOOP.EMETER.COM with kvno 23, encryption type arcfour-hmac added to keytab WRFILE:hdfs.keytab.&lt;BR /&gt;kadmin.local: quit&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks again for the help that you guys provided!!!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Gabre.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Mar 2018 14:16:33 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudera-Kerberos-GSS-initiate-failed/m-p/65552#M75899</guid>
      <dc:creator>Gabre</dc:creator>
      <dc:date>2018-03-19T14:16:33Z</dc:date>
    </item>
    <item>
      <title>Re: Cloudera - Kerberos GSS initiate failed</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudera-Kerberos-GSS-initiate-failed/m-p/78727#M75900</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are facing similar issue. Not able execute any hadoop commands from the node and services like Datanode, Node manager are not starting on the node.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please find the log below when I executed the command&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;HADOOP_ROOT_LOGGER=TRACE,console HADOOP_JAAS_DEBUG=true HADOOP_OPTS="-Dsun.security.krb5.debug=true" hdfs dfs -ls /&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Affected node - Seems kdc is connecting using UDP and not TCP&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt;&amp;gt; Credentials acquireServiceCreds: same realm&lt;BR /&gt;default etypes for default_tgs_enctypes: 23 1 3.&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; CksumType: sun.security.krb5.internal.crypto.RsaMd5CksumType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.ArcFourHmacEType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KdcAccessibility: reset&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KrbKdcReq send: kdc=***** UDP:88, timeout=3000, number of retries =3, #bytes=2247&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KDCCommunication: kdc=****** UDP:88, timeout=3000,Attempt =1, #bytes=2247&lt;BR /&gt;SocketTimeOutException with attempt: 1&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KDCCommunication: kdc=****** UDP:88, timeout=3000,Attempt =2, #bytes=2247&lt;BR /&gt;SocketTimeOutException with attempt: 2&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KDCCommunication: kdc=****** UDP:88, timeout=3000,Attempt =3, #bytes=2247&lt;BR /&gt;SocketTimeOutException with attempt: 3&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KrbKdcReq send: error trying ******:88&lt;BR /&gt;java.net.SocketTimeoutException: Receive timed out&lt;BR /&gt;at java.net.PlainDatagramSocketImpl.receive0(Native Method)&lt;BR /&gt;at java.net.AbstractPlainDatagramSocketImpl.receive(AbstractPlainDatagramSocketImpl.java:145)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Another node from the same rack which is working fine&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt;&amp;gt; Credentials acquireServiceCreds: same realm&lt;BR /&gt;default etypes for default_tgs_enctypes: 23 1 3.&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; CksumType: sun.security.krb5.internal.crypto.RsaMd5CksumType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.ArcFourHmacEType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KdcAccessibility: reset&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KrbKdcReq send: kdc=****** UDP:88, timeout=3000, number of retries =3, #bytes=2247&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KDCCommunication: kdc=****** UDP:88, timeout=3000,Attempt =1, #bytes=2247&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KrbKdcReq send: #bytes read=104&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KrbKdcReq send: kdc=****** TCP:88, timeout=3000, number of retries =3, #bytes=2247&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KDCCommunication: kdc=****** TCP:88, timeout=3000,Attempt =1, #bytes=2247&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt;DEBUG: TCPClient reading 2722 bytes&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KrbKdcReq send: #bytes read=2722&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KdcAccessibility: remove ****** :88&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.ArcFourHmacEType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KrbApReq: APOptions are 00100000 00000000 00000000 00000000&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.ArcFourHmacEType&lt;BR /&gt;Krb5Context setting mySeqNumber to: 83326031&lt;BR /&gt;Created InitSecContextToken:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We then tried to force krb to use tcp by below method.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Added below parameter to krb5.conf but didn't help&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;udp_preference_limit =1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;&lt;P&gt;Vijith Vijayan&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Aug 2018 07:15:09 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudera-Kerberos-GSS-initiate-failed/m-p/78727#M75900</guid>
      <dc:creator>vijithv</dc:creator>
      <dc:date>2018-08-21T07:15:09Z</dc:date>
    </item>
    <item>
      <title>Re: Cloudera - Kerberos GSS initiate failed</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudera-Kerberos-GSS-initiate-failed/m-p/78766#M75901</link>
      <description>&lt;P&gt;I was using a custom krb5.conf and it didn't work. Next I tried to change /etc/krb5.conf and then worked.&lt;/P&gt;&lt;P&gt;Just wondering why it is not possible with UDP?&lt;/P&gt;</description>
      <pubDate>Tue, 21 Aug 2018 23:52:46 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudera-Kerberos-GSS-initiate-failed/m-p/78766#M75901</guid>
      <dc:creator>vijithv</dc:creator>
      <dc:date>2018-08-21T23:52:46Z</dc:date>
    </item>
    <item>
      <title>Re: Cloudera - Kerberos GSS initiate failed</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudera-Kerberos-GSS-initiate-failed/m-p/78851#M75902</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/12222"&gt;@vijithv&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hard to say, but the timeout indicates that the client could not reach the KDC via UDP from that host.&amp;nbsp; Could be firewall, DNS, etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;UDP has packet size restrictions that often don't permit Active Directory tickets to be issued.&amp;nbsp; Generally, the KDC will tell the client and the client will try TCP, but it seems on your one host that a connection to the KDC cannot even be made.&amp;nbsp; Firewall rules are certainly suspect but a number of things could cause this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Using TCP always is fine.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Aug 2018 05:17:55 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudera-Kerberos-GSS-initiate-failed/m-p/78851#M75902</guid>
      <dc:creator>bgooley</dc:creator>
      <dc:date>2018-08-23T05:17:55Z</dc:date>
    </item>
    <item>
      <title>Re: Cloudera - Kerberos GSS initiate failed</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudera-Kerberos-GSS-initiate-failed/m-p/78855#M75903</link>
      <description>&lt;P&gt;Thank you&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/4054"&gt;@bgooley&lt;/a&gt;. Will be able to clarify the below query?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When comparing to other host (like below). Does that mean it try to connect with UDP first and then switched to TCP?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt;&amp;gt; KrbKdcReq send: kdc=****** UDP:88, timeout=3000, number of retries =3, #bytes=2247&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KDCCommunication: kdc=&lt;SPAN&gt;******&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt; UDP:88, timeout=3000,Attempt =1, #bytes=2247&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KrbKdcReq send: #bytes read=104&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KrbKdcReq send: kdc=&lt;SPAN&gt;******&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt; TCP:88, timeout=3000, number of retries =3, #bytes=2247&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KDCCommunication: kdc=&lt;SPAN&gt;******&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt; TCP:88, timeout=3000,Attempt =1, #bytes=2247&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt;DEBUG: TCPClient reading 2722 bytes&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KrbKdcReq send: #bytes read=2722&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If so, what could be the reason the affected host is not&amp;nbsp;switching in similar manner. If that is with firewall, then how is it working when we add paramater&amp;nbsp;udp_preference_limit to connect with TCP?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks you&lt;/P&gt;&lt;P&gt;Vijith&lt;/P&gt;</description>
      <pubDate>Thu, 23 Aug 2018 05:57:00 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudera-Kerberos-GSS-initiate-failed/m-p/78855#M75903</guid>
      <dc:creator>vijithv</dc:creator>
      <dc:date>2018-08-23T05:57:00Z</dc:date>
    </item>
    <item>
      <title>Re: Cloudera - Kerberos GSS initiate failed</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudera-Kerberos-GSS-initiate-failed/m-p/78859#M75904</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/12222"&gt;@vijithv&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;First, firewalls can easily block UDP and allow TCP.&amp;nbsp; I mentioned that was a possible cause.&lt;/P&gt;&lt;P&gt;Also, depending on how you have your /etc/krb5.conf configured, a different KDC could have been contacted.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can see distinctly in the failure via UDP that there is a socket timeout for each attempt to connect to the KDC.&amp;nbsp; This is a failure at the networking side where a client cannot connect to a server.&amp;nbsp; Since no connection was ever made via UDP, there was no change for it to know to try TCP.&amp;nbsp; That "switching" is done based on a response of KRB5KRB_ERR_RESPONSE_TOO_BIG I believe so if no response is made, no "switching" to TCP will occur.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you really want to get to the bottom of this, recreate the problem while capturing packets via tcpdump like this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;# tcpdump -i any -w ~/kerberos_broken.pcap port 88&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then, with the problem fixed reproduce again while capturing packets:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;# tcpdump -i any -w ~/kerberos_fixed.pcap port 88&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Use Wireshark (it does a great job of decoding Kerberos packets) and you will be able to see the entire interaction.&lt;/P&gt;&lt;P&gt;This will show us information to help determine the cause.&lt;/P&gt;&lt;P&gt;Wireshark is here:&amp;nbsp; &lt;A href="https://www.wireshark.org/" target="_blank"&gt;https://www.wireshark.org/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Aug 2018 06:43:12 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Cloudera-Kerberos-GSS-initiate-failed/m-p/78859#M75904</guid>
      <dc:creator>bgooley</dc:creator>
      <dc:date>2018-08-23T06:43:12Z</dc:date>
    </item>
  </channel>
</rss>

