Description of Common Kerberos-Related Errors in Windows 2000 (230476)
The information in this article applies to:
- Microsoft Windows 2000 Server
- Microsoft Windows 2000 Advanced Server
- Microsoft Windows 2000 Professional
- Microsoft Windows 2000 Datacenter Server
This article was previously published under Q230476 SUMMARY Windows 2000 provides support for MIT Kerberos version 5
authentication, as defined in IETF Request For Comment (RFC) 1510. The Kerberos
protocol is composed of three sub-protocols. The sub-protocol through which the
client pre-sends the ticket for admission to a service is called the
Application (AP) Exchange. The sub-protocol through which the KDC distributes a
service session key and a ticket for the service is called the Ticket-Granting
Service (TGS) Exchange. The sub-protocol through which the client pre-sends the
ticket for admission to a service is called the Client/Server (CS)
Exchange.
This article describes common Kerberos version 5-related
errors, and includes causes that may be associated with the errors. Note that
these errors are associated with Kerberos specifically, not network
connectivity. MORE INFORMATION Common Kerberos version 5-related errors in Hexadecimal: 0x6 (KRB_ERR_C_PRINCIPAL_UNKNOWN) "Client not found in Kerberos database" The KDC could not translate the client principal name from the
KDC request into an account in the Active Directory. Generally, verifying
whether the client account exists and has propagated to the domain controller
that generated the error. Checking Active Directory replication may provide an
indication of why the error occurred. It can also be a problem where the name
specified is not a recognized User principal name present on the
userPrincipalName attribute of the account. 0x7 (KRB_ERR_S_PRINCIPAL_UNKNOWN) "Server not found in Kerberos database" The KDC could not translate the server principal name from the
KDC request into an account in the Active Directory. Generally, verifying
whether the server account exists and has propagated to the domain controller
that generated the error. Checking Active Directory replication may provides an
indication of why the error occurred. Also if the server is not at least
Windows 2000, there will not be any service principal names registered because
that server is not capable of authenticating with Kerberos. In this case, this
error can be ignored because the client will then switch to NTLM for
authentication. 0x9 (KDC_ERR_NULL_KEY) "The client or server has a null key" Keys should never be null (blank). Even null passwords generate
keys because the password is concatenated with other elements to form the key.
If a client sees this error, the administrator should reset the password on the
account. 0xE (KDC_ERR_ETYPE_NOTSUPP) "KDC has no support for the encryption type"
Modification Type: | Major | Last Reviewed: | 9/22/2003 |
---|
Keywords: | kbenv kberrmsg kbinfo kbnetwork KB230476 |
---|
|