<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cannot use AES256 for NFS Kerberos in Network and Storage Protocols</title>
    <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/Cannot-use-AES256-for-NFS-Kerberos/m-p/462965#M10195</link>
    <description>&lt;P&gt;I am having problems restricting kerberized NFS to use only AES encryption. We had kerberized NFS running until the other encryptions were blocked at the KDC.&lt;/P&gt;&lt;P&gt;Context:&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;FAS2720&lt;/SPAN&gt;&amp;nbsp;Filer&lt;/P&gt;&lt;P&gt;Ontap 9.8P18&lt;/P&gt;&lt;P&gt;KDC is Microsoft AD (I only have permissions im my OU)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I used Microsoft ktpass to create a keytab for my nfs SPN account and used that as -keytab-uri parameter for kerberos interface enable (using admin-username and admin-password failed).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now I cannot mount volumes that are restricted to kerberos and when I try the event log tells me&amp;nbsp;[ 0] FAILURE: Failed to accept the context: Unspecified GSS failure. Minor code may provide more information (minor: Key table entry not found).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Packet capture shows a NFS V3 NULL call using an apparently correct kerberos ticket, with a reply that has a GSS major/minor status&amp;nbsp; 851968/2529639093, that is consistent with that error. (Client principal is the client host in that exchange).&lt;/P&gt;&lt;P&gt;However I cannot understand why the key table entry cannot be found.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have checked that&amp;nbsp;&lt;/P&gt;&lt;P&gt;the nfs SPN matches in the keytab, the keyblock shown by the ontap CLI, the AD machine entry and the captured packets (also checked the letter case)&lt;/P&gt;&lt;P&gt;the kvno also matches here&lt;/P&gt;&lt;P&gt;the encryption type (18) and the key match in the keytab and the keyblock, and the key can decrypt the encrypted parts of the packets in wireshark&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also checked that aes-256 and aes-128 are permitted-enc-types in vserver nfs show,&lt;/P&gt;&lt;P&gt;and that these encryption types are enabled in the AD for both the NFS Server account and the client host account&lt;/P&gt;&lt;P&gt;that users can obtain service tickets for the nfs server using kvno&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any Ideas?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 29 Aug 2025 15:36:02 GMT</pubDate>
    <dc:creator>Hans_R</dc:creator>
    <dc:date>2025-08-29T15:36:02Z</dc:date>
    <item>
      <title>Cannot use AES256 for NFS Kerberos</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/Cannot-use-AES256-for-NFS-Kerberos/m-p/462965#M10195</link>
      <description>&lt;P&gt;I am having problems restricting kerberized NFS to use only AES encryption. We had kerberized NFS running until the other encryptions were blocked at the KDC.&lt;/P&gt;&lt;P&gt;Context:&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;FAS2720&lt;/SPAN&gt;&amp;nbsp;Filer&lt;/P&gt;&lt;P&gt;Ontap 9.8P18&lt;/P&gt;&lt;P&gt;KDC is Microsoft AD (I only have permissions im my OU)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I used Microsoft ktpass to create a keytab for my nfs SPN account and used that as -keytab-uri parameter for kerberos interface enable (using admin-username and admin-password failed).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now I cannot mount volumes that are restricted to kerberos and when I try the event log tells me&amp;nbsp;[ 0] FAILURE: Failed to accept the context: Unspecified GSS failure. Minor code may provide more information (minor: Key table entry not found).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Packet capture shows a NFS V3 NULL call using an apparently correct kerberos ticket, with a reply that has a GSS major/minor status&amp;nbsp; 851968/2529639093, that is consistent with that error. (Client principal is the client host in that exchange).&lt;/P&gt;&lt;P&gt;However I cannot understand why the key table entry cannot be found.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have checked that&amp;nbsp;&lt;/P&gt;&lt;P&gt;the nfs SPN matches in the keytab, the keyblock shown by the ontap CLI, the AD machine entry and the captured packets (also checked the letter case)&lt;/P&gt;&lt;P&gt;the kvno also matches here&lt;/P&gt;&lt;P&gt;the encryption type (18) and the key match in the keytab and the keyblock, and the key can decrypt the encrypted parts of the packets in wireshark&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also checked that aes-256 and aes-128 are permitted-enc-types in vserver nfs show,&lt;/P&gt;&lt;P&gt;and that these encryption types are enabled in the AD for both the NFS Server account and the client host account&lt;/P&gt;&lt;P&gt;that users can obtain service tickets for the nfs server using kvno&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any Ideas?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Aug 2025 15:36:02 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/Cannot-use-AES256-for-NFS-Kerberos/m-p/462965#M10195</guid>
      <dc:creator>Hans_R</dc:creator>
      <dc:date>2025-08-29T15:36:02Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot use AES256 for NFS Kerberos</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/Cannot-use-AES256-for-NFS-Kerberos/m-p/462980#M10196</link>
      <description>&lt;P&gt;I could now solve the problem by upgrading to Ontap 9.16.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Sep 2025 14:37:56 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/Cannot-use-AES256-for-NFS-Kerberos/m-p/462980#M10196</guid>
      <dc:creator>Hans_R</dc:creator>
      <dc:date>2025-09-02T14:37:56Z</dc:date>
    </item>
  </channel>
</rss>

