Open pnquest opened 1 year ago
Thanks @pnquest for bringing this issue to our attention. We'll take a look at it soon.
We would recommend contacting Microsoft Support for troubleshooting.
@pnquest
Are you able to connect to target server using Kerberos with any other driver/tool from the same machine?
sqlcmd -S SQLSERVERNAME\INSTANCENAME -E works fine.
@pnquest
Are you able to connect to target server using Kerberos with any other driver/tool from the same machine?
Sqlcmd works fine with this setup.
Describe the bug
We have an application running in an ubuntu 20.04 docker container connecting to sql server 2017 using Kerberos auth. The connection string looks like this:
Server=host.domain\instance; Database=Name; Encrypt=yes; Integrated Security=true
.Currently, DNS resolution directly targets an AD DNS server, and everything works fine. Our infrastructure team is currently trying to switch to a bind DNS backend, that will proxy appropriate requests to those same AD DNS servers when appropriate. As soon as this change is made, SQL Server Keberos authentication stops functioning and we get the exception and stack trace displayed below.
This is especially odd, not only because this same configuration works fine using AD DNS, but also because our kerberos configuration definitely does specify a default realm:
To reproduce
Expected behavior
Kerberos auth should continue to function.
Further technical details
Microsoft.Data.SqlClient version: 5.0.1 .NET target: .Net 6.0.11 SQL Server version: SQL Server 2017 Operating system: Ubuntu 20.04 docker container.