Consider the following scenario:
- A Massachusetts Institute of Technology (MIT) Kerberos client performs Kerberos authentication against a Windows Server 2008-based domain controller.
- KTPass was used to create a keytab file to be used on the MIT Kerberos client.
- The client requests a ticket-granting ticket (TGT) by specifying the host principal name as the client name in the KRB_AS_REQ packet.
KERB5KDC_ERR_C_PRINICPAL_UNKNOWN
This problem may occur when a third-party implementation of a Kerberos client interoperates with a Windows Server 2008-based domain controller. For example, this problem may occur if a principal name in the "service/user@realm.com" format is used to generate a keytab file.