Here’s the relevent entries in krb5kdc.log as well as the KRB5_TRACE of the ssh session startup with ssh -v:
---------- kdc.log -----------
Jul 21 12:12:12 ipasrv1.ipa.example.com krb5kdc1985: TGS_REQ (6 etypes {aes256-cts-hmac-sha1-96(18), aes256-cts-hmac-sha384-192(20), camellia256-cts-cmac(26), aes128-cts-hmac-sha256-128(19), aes128-cts-hmac-sha1-96(17), camellia128-cts-cmac(25)}) 192.168.2.20: HIGHER_AUTHENTICATION_REQUIRED: authtime 1689879992, testuser@IPA.EXAMPLE.COM for host/ipasrv1.ipa.example.com@IPA.EXAMPLE.COM, Required auth indicators not present in ticket: pkinit hardened
Jul 21 12:12:12 ipasrv1.ipa.example.com krb5kdc1985: closing down fd 11
Jul 21 12:12:12 ipasrv1.ipa.example.com krb5kdc1985: TGS_REQ (6 etypes {aes256-cts-hmac-sha1-96(18), aes256-cts-hmac-sha384-192(20), camellia256-cts-cmac(26), aes128-cts-hmac-sha256-128(19), aes128-cts-hmac-sha1-96(17), camellia128-cts-cmac(25)}) 192.168.2.20: HIGHER_AUTHENTICATION_REQUIRED: authtime 1689879992, testuser@IPA.EXAMPLE.COM for host/ipasrv1.ipa.example.com@IPA.EXAMPLE.COM, Required auth indicators not present in ticket: pkinit hardened
Jul 21 12:12:12 ipasrv1.ipa.example.com krb5kdc1985: closing down fd 11
Jul 21 12:12:19 ipasrv1.ipa.example.com krb5kdc1986: AS_REQ (6 etypes {aes256-cts-hmac-sha1-96(18), aes256-cts-hmac-sha384-192(20), camellia256-cts-cmac(26), aes128-cts-hmac-sha256-128(19), aes128-cts-hmac-sha1-96(17), camellia128-cts-cmac(25)}) 192.168.2.4: NEEDED_PREAUTH: testuser@IPA.EXAMPLE.COM for krbtgt/IPA.EXAMPLE.COM@IPA.EXAMPLE.COM, Additional pre-authentication required
Jul 21 12:12:19 ipasrv1.ipa.example.com krb5kdc1986: closing down fd 11
Jul 21 12:12:19 ipasrv1.ipa.example.com krb5kdc1986: AS_REQ (6 etypes {aes256-cts-hmac-sha1-96(18), aes256-cts-hmac-sha384-192(20), camellia256-cts-cmac(26), aes128-cts-hmac-sha256-128(19), aes128-cts-hmac-sha1-96(17), camellia128-cts-cmac(25)}) 192.168.2.4: ISSUE: authtime 1689955939, etypes {rep=aes256-cts-hmac-sha1-96(18), tkt=aes256-cts-hmac-sha1-96(18), ses=aes256-cts-hmac-sha1-96(18)}, testuser@IPA.EXAMPLE.COM for krbtgt/IPA.EXAMPLE.COM@IPA.EXAMPLE.COM
Jul 21 12:12:19 ipasrv1.ipa.example.com krb5kdc1986: closing down fd 11
Jul 21 12:12:19 ipasrv1.ipa.example.com krb5kdc1986: TGS_REQ (6 etypes {aes256-cts-hmac-sha1-96(18), aes256-cts-hmac-sha384-192(20), camellia256-cts-cmac(26), aes128-cts-hmac-sha256-128(19), aes128-cts-hmac-sha1-96(17), camellia128-cts-cmac(25)}) 192.168.2.4: HIGHER_AUTHENTICATION_REQUIRED: authtime 1689955939, testuser@IPA.EXAMPLE.COM for host/ipasrv1.ipa.example.com@IPA.EXAMPLE.COM, Required auth indicators not present in ticket: pkinit hardened
Jul 21 12:12:19 ipasrv1.ipa.example.com krb5kdc1986: closing down fd 11
Jul 21 12:12:19 ipasrv1.ipa.example.com krb5kdc1986: TGS_REQ (6 etypes {aes256-cts-hmac-sha1-96(18), aes256-cts-hmac-sha384-192(20), camellia256-cts-cmac(26), aes128-cts-hmac-sha256-128(19), aes128-cts-hmac-sha1-96(17), camellia128-cts-cmac(25)}) 192.168.2.4: HIGHER_AUTHENTICATION_REQUIRED: authtime 1689955939, testuser@IPA.EXAMPLE.COM for host/ipasrv1.ipa.example.com@IPA.EXAMPLE.COM, Required auth indicators not present in ticket: pkinit hardened
Jul 21 12:12:19 ipasrv1.ipa.example.com krb5kdc1986: closing down fd 11
Jul 21 12:12:20 ipasrv1.ipa.example.com krb5kdc1986: AS_REQ (6 etypes {aes256-cts-hmac-sha1-96(18), aes256-cts-hmac-sha384-192(20), camellia256-cts-cmac(26), aes128-cts-hmac-sha256-128(19), aes128-cts-hmac-sha1-96(17), camellia128-cts-cmac(25)}) 192.168.2.4: NEEDED_PREAUTH: testuser@IPA.EXAMPLE.COM for krbtgt/IPA.EXAMPLE.COM@IPA.EXAMPLE.COM, Additional pre-authentication required
Jul 21 12:12:20 ipasrv1.ipa.example.com krb5kdc1986: closing down fd 11
Jul 21 12:12:39 ipasrv1.ipa.example.com krb5kdc1985: AS_REQ (6 etypes {aes256-cts-hmac-sha1-96(18), aes256-cts-hmac-sha384-192(20), camellia256-cts-cmac(26), aes128-cts-hmac-sha256-128(19), aes128-cts-hmac-sha1-96(17), camellia128-cts-cmac(25)}) 192.168.2.4: ISSUE: authtime 1689955959, etypes {rep=aes256-cts-hmac-sha1-96(18), tkt=aes256-cts-hmac-sha1-96(18), ses=aes256-cts-hmac-sha1-96(18)}, testuser@IPA.EXAMPLE.COM for krbtgt/IPA.EXAMPLE.COM@IPA.EXAMPLE.COM
Jul 21 12:12:39 ipasrv1.ipa.example.com krb5kdc1985: closing down fd 11
---------- KRB5_TRACE=/dev/stderr ssh -v -----------
OpenSSH_9.0p1, OpenSSL 3.0.9 30 May 2023
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Reading configuration data /etc/ssh/ssh_config.d/04-ipa.conf
debug1: Executing command: ‘true’
debug1: Reading configuration data /etc/ssh/ssh_config.d/50-redhat.conf
debug1: Reading configuration data /etc/crypto-policies/back-ends/openssh.config
debug1: Reading configuration data /etc/ssh/ssh_config.d/99-local.conf
debug1: configuration requests final Match pass
debug1: re-parsing configuration
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Reading configuration data /etc/ssh/ssh_config.d/04-ipa.conf
debug1: Executing command: ‘true’
debug1: Reading configuration data /etc/ssh/ssh_config.d/50-redhat.conf
debug1: Reading configuration data /etc/crypto-policies/back-ends/openssh.config
debug1: Reading configuration data /etc/ssh/ssh_config.d/99-local.conf
debug1: Executing proxy command: exec /usr/bin/sss_ssh_knownhostsproxy -p 22 ipasrv1
debug1: identity file /home/testuser/.ssh/id_rsa type 0
debug1: identity file /home/testuser/.ssh/id_rsa-cert type -1
debug1: identity file /home/testuser/.ssh/id_ecdsa type -1
debug1: identity file /home/testuser/.ssh/id_ecdsa-cert type -1
debug1: identity file /home/testuser/.ssh/id_ecdsa_sk type -1
debug1: identity file /home/testuser/.ssh/id_ecdsa_sk-cert type -1
debug1: identity file /home/testuser/.ssh/id_ed25519 type 3
debug1: identity file /home/testuser/.ssh/id_ed25519-cert type -1
debug1: identity file /home/testuser/.ssh/id_ed25519_sk type -1
debug1: identity file /home/testuser/.ssh/id_ed25519_sk-cert type -1
debug1: identity file /home/testuser/.ssh/id_xmss type -1
debug1: identity file /home/testuser/.ssh/id_xmss-cert type -1
debug1: identity file /home/testuser/.ssh/id_dsa type -1
debug1: identity file /home/testuser/.ssh/id_dsa-cert type -1
debug1: Local version string SSH-2.0-OpenSSH_9.0
debug1: Remote protocol version 2.0, remote software version OpenSSH_9.0
debug1: compat_banner: match: OpenSSH_9.0 pat OpenSSH* compat 0x04000000
debug1: Authenticating to ipasrv1:22 as ‘testuser’
debug1: load_hostkeys: fopen /home/testuser/.ssh/known_hosts2: No such file or directory
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: kex: algorithm: curve25519-sha256
debug1: kex: host key algorithm: ssh-ed25519
debug1: kex: server->client cipher: aes256-gcm@openssh.com MAC: compression: none
debug1: kex: client->server cipher: aes256-gcm@openssh.com MAC: compression: none
debug1: kex: curve25519-sha256 need=32 dh_need=32
debug1: kex: curve25519-sha256 need=32 dh_need=32
debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
debug1: SSH2_MSG_KEX_ECDH_REPLY received
debug1: Server host key: ssh-ed25519 SHA256:2LwdjNZeyFy3+64ci18s4JlqA7v1LOwsn9LgPBgDUEg
debug1: load_hostkeys: fopen /home/testuser/.ssh/known_hosts2: No such file or directory
debug1: Host ‘ipasrv1’ is known and matches the ED25519 host key.
debug1: Found key in /var/lib/sss/pubconf/known_hosts:1
Host key fingerprint is SHA256:2LwdjNZeyFy3+64ci18s4JlqA7v1LOwsn9LgPBgDUEg
±-[ED25519 256]–+
.Eo. |
o |
. . . |
. + * o . . |
… S B o . |
o.o+ + + o |
.+ + + o|
. Bo*= o * |
.O*o+.=oo|
±—[SHA256]-----+
debug1: rekey out after 4294967296 blocks
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug1: SSH2_MSG_NEWKEYS received
debug1: rekey in after 4294967296 blocks
debug1: get_agent_identities: bound agent to hostkey
debug1: get_agent_identities: agent returned 3 keys
debug1: Will attempt key: /home/testuser/.ssh/id_rsa RSA SHA256:wwy3FvT2LOg7q6ZxvFKGZSdhZ8xWQh4AmoVYDDZgPxM agent
debug1: Will attempt key: /home/testuser/.ssh/id_ed25519 ED25519 SHA256:RAtqjVfwIjU2k/vwG0MDleyGJKRtQf37xVMtEQ8uHvA agent
debug1: Will attempt key: /home/testuser/.config/gsconnect/private.pem RSA SHA256://nkWaqaVZ9A5/oogE4a1NWFQ+stA2EZP61XEx5Ax+g agent
debug1: Will attempt key: /home/testuser/.ssh/id_ecdsa
debug1: Will attempt key: /home/testuser/.ssh/id_ecdsa_sk
debug1: Will attempt key: /home/testuser/.ssh/id_ed25519_sk
debug1: Will attempt key: /home/testuser/.ssh/id_xmss
debug1: Will attempt key: /home/testuser/.ssh/id_dsa
debug1: SSH2_MSG_EXT_INFO received
debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,sk-ssh-ed25519@openssh.com,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256@openssh.com,webauthn-sk-ecdsa-sha2-nistp256@openssh.com>
debug1: kex_input_ext_info: publickey-hostbound@openssh.com=<0>
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug1: Authentications that can continue: publickey,gssapi-with-mic
debug1: Next authentication method: gssapi-with-mic
debug1: Unspecified GSS failure. Minor code may provide more information
KDC policy rejects request
debug1: Authentications that can continue: publickey,gssapi-with-mic
debug1: Next authentication method: publickey
I’m thinking the specific issue stems from “Required auth indicators not present in ticket: pkinit hardened”