9fans - fans of the OS Plan 9 from Bell Labs
 help / color / mirror / Atom feed
* [9fans] Mysterious auth again...?
@ 2014-08-04 13:51 Pavel Klinkovský
  2014-08-04 15:26 ` stevie
  0 siblings, 1 reply; 6+ messages in thread
From: Pavel Klinkovský @ 2014-08-04 13:51 UTC (permalink / raw)
  To: Fans of the OS Plan 9 from Bell Labs

[-- Attachment #1: Type: text/plain, Size: 997 bytes --]

Hi all,

I am fighting with configuration of '9pccpuf' server.

I have configured user 'bootes' as a hostowner.
I have 'listen', 'keyfs' running.

I can 'cpu' such server from another Plan9 terminal ('9pcf') as user
'bootes'.
I can 'srv' such server from another Plan9 terminal ('9pcf') as user
'bootes'.

BUT:

server# auth/debug
p9sk1 key: dom=xxx proto=p9sk1 user=bootes !hex? !password?
        successfully dialed auth server
        password for bootes<at>xxx [hit enter to skip test]:
        cannot decrypt ticket1 from auth server (bad t.num=0x...)
        auth server and you do not agree on key for bootes<at>xxx

I found that it was already solved in the past...
http://comments.gmane.org/gmane.os.plan9.general/55049

but it looks I have a correct sequence in /rc/bin/cpurc, /cfg/server/cpurc,
/cfg/server/cpustart...

Any idea what do I have wrong?

Thanks in advance.

Pavel

P.S.: I cannot make 'auth' system to work with another added user... :(

[-- Attachment #2: Type: text/html, Size: 3206 bytes --]

^ permalink raw reply	[flat|nested] 6+ messages in thread

end of thread, other threads:[~2014-08-05 13:50 UTC | newest]

Thread overview: 6+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2014-08-04 13:51 [9fans] Mysterious auth again...? Pavel Klinkovský
2014-08-04 15:26 ` stevie
2014-08-05  7:34   ` Pavel Klinkovský
2014-08-05  9:01     ` stevie
2014-08-05  9:09       ` Pavel Klinkovský
2014-08-05 13:50         ` Pavel Klinkovský

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).