Hi,
I have a handful of PCs (all WinXP) in my pool, running 6.8.2. I having problems with condor_store_cred on just one PC. All the others run condor_store_cred just fine. All PCs (including the problem PC) have the pool password set and are able to run jobs. Here is the output from condor_store_cred add: [user@computer]$ condor_store_cred add Account: user@domain Enter
password:
Operation failed.
3/8 16:15:10
DC_AUTHENTICATE: received DC_AUTHENTICATE from <
xxx.xxx.xxx.xxx:1718>Make sure your HOSTALLOW_WRITE setting includes this host. [user@computer]$ All HOSTALLOW_WRITE (and HOSTALLOW_READ) are set to * ( i.e. on both the problem PC and on the central manager, and all other PCs). I've tried several changes to HOSTALLOW_WRITE, on both the problem PC and on the central manager: adding the domain (*.my.domain), using the computer name, using the actual IP address, etc. In all cases I get the same error. Here is the relevant portion of the CreddLog: 3/8 16:15:10 DC_AUTHENTICATE: received following ClassAd: MyType = "(unknown type)" TargetType = "(unknown type)" AuthMethods = "NTSSPI, PASSWORD" CryptoMethods = "3DES,BLOWFISH" OutgoingNegotiation = "PREFERRED" Authentication = "OPTIONAL" Encryption = "OPTIONAL" Integrity = "OPTIONAL" Enact = "NO" Subsystem = "TOOL" ServerPid = 3796 SessionDuration = "60" NewSession = "YES" RemoteVersion = "$CondorVersion: 6.8.2 Oct 12 2006 $" Command = 479 3/8 16:15:10 DC_AUTHENTICATE: our_policy: MyType = "" TargetType = "" AuthMethods = "NTSSPI" CryptoMethods = "3DES,BLOWFISH" OutgoingNegotiation = "REQUIRED" Authentication = "REQUIRED" Encryption = "REQUIRED" Integrity = "REQUIRED" Enact = "NO" Subsystem = "CREDD" ServerPid = 6088 SessionDuration = "8640000" 3/8 16:15:10 DC_AUTHENTICATE: the_policy: MyType = "" TargetType = "" Authentication = "YES" Encryption = "YES" Integrity = "YES" AuthMethodsList = "NTSSPI" AuthMethods = "NTSSPI" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "60" Enact = "YES" 3/8 16:15:10 DC_AUTHENTICATE: generating 3DES key for session central_manager:6088:1173388510 3/8 16:15:10 SECMAN: Sending following response ClassAd: MyType = "" TargetType = "" Authentication = "YES" Encryption = "YES" Integrity = "YES" AuthMethodsList = "NTSSPI" AuthMethods = "NTSSPI" CryptoMethods = "3DES,BLOWFISH" SessionDuration = "60" Enact = "YES" RemoteVersion = "$CondorVersion: 6.8.2 Oct 12 2006 $" 3/8 16:15:10 SECMAN: new session, doing initial authentication. 3/8 16:15:10 DC_AUTHENTICATE: authenticating RIGHT NOW. 3/8 16:15:10 AUTHENTICATE: in authenticate( addr == NULL, methods == 'NTSSPI') 3/8 16:15:10 AUTHENTICATE: can still try these methods: NTSSPI 3/8 16:15:10 HANDSHAKE: in handshake(my_methods = 'NTSSPI') 3/8 16:15:10 HANDSHAKE: handshake() - i am the server 3/8 16:15:10 HANDSHAKE: client sent (methods == 16) 3/8 16:15:10 HANDSHAKE: i picked (method == 16) 3/8 16:15:10 HANDSHAKE: client received (method == 16) 3/8 16:15:10 AUTHENTICATE: will try to use 16 (NTSSPI) 3/8 16:15:10 sspi_server_auth() entered 3/8 16:15:10 sspi_server_auth() looping 3/8 16:15:10 sspi_server_auth(): Oops! ASC() returned -2146893044! 3/8 16:15:10 sspi_server_auth(): Failed to impersonate (returns -2146893055)! 3/8 16:15:10 sspi_server_auth() exiting 3/8 16:15:10 AUTHENTICATE: method 16 (NTSSPI) failed. 3/8 16:15:11 AUTHENTICATE: can still try these methods: NTSSPI 3/8 16:15:11 HANDSHAKE: in handshake(my_methods = 'NTSSPI') 3/8 16:15:11 HANDSHAKE: handshake() - i am the server 3/8 16:15:11 condor_read(): Socket closed when trying to read 5 bytes from <xxx.xxx.xxx.xxx:1718> 3/8 16:15:11 IO: EOF reading packet header 3/8 16:15:11 AUTHENTICATE: handshake failed! 3/8 16:15:11 AUTHENTICATE: auth_status == 0 (?!?) 3/8 16:15:11 Authentication was a FAILURE. 3/8 16:15:11 DC_AUTHENTICATE: authenticate failed: AUTHENTICATE:1002:Failure performing handshake|AUTHENTICATE:1004 Any help is appreciated. Richard. |