ivaneeo's blog

          自由的力量,自由的生活。

            BlogJava :: 首頁 :: 聯系 :: 聚合  :: 管理
            669 Posts :: 0 Stories :: 64 Comments :: 0 Trackbacks

          Kerberos Server Configuration

          These notes are for MIT Kerberos 1.3 or higher.

          • /etc/krb5.conf
          • The /etc/krb5.conf configuration file should include rc4-hmac support under the [libdefaults] section. Windows XP uses rc4-hmac. However, do not include rc4-hmac in the default* encryption types, as older Unix clients may not support rc4-hmac.

            [libdefaults]
            default_realm = EXAMPLE.ORG
            default_etypes = des3-hmac-sha1 des-cbc-crc
            default_tkt_enctypes = des3-hmac-sha1 des-cbc-crc
            default_tgs_enctypes = des3-hmac-sha1 des-cbc-crc
            permitted_enctypes = des3-hmac-sha1 des-cbc-crc rc4-hmac
            dns_lookup_realm = false
            dns_lookup_kdc = true

          • kdc.conf
          • The kdc.conf configuration file on the Kerberos servers must support rc4-hmac as an encryption type.

            [realms]
            EXAMPLE.ORG = {
            database_name = /var/kerberos/krb5kdc/principal
            key_stash_file = /var/kerberos/krb5kdc/.k5.EXAMPLE.ORG
            supported_enctypes = des3-hmac-sha1:normal des-cbc-crc:normal ?
            rc4-hmac:normal
            }

          Windows Client Setup

          • Kerberos Configuration
          • Use the ksetup.exe command to add the site Kerberos servers.

            $ ksetup.exe /addkdc EXAMPLE.ORG kerberos-1.example.org
            $ ksetup.exe /addkdc EXAMPLE.ORG kerberos-2.example.org
            $ ksetup.exe /addkdc EXAMPLE.ORG kerberos.example.org
            $ ksetup.exe /addkpasswd EXAMPLE.ORG kerberos.example.org
            $ ksetup.exe /setrealm EXAMPLE.ORG

          • Host principals
          • Create host principals on each Windows client, then use the same password to create an equivalent principal in the MIT Kerberos database. If using an installation system such as Unattended, use a script to generate the random password and setup the host principal.

            #!/usr/bin/perl

            my $domain = 'example.org';

            my $password = '';
            my @chars = grep { /[[:print:]]/ and /\S/ } map { chr } 1..128;
            $password .= $chars[rand @chars] for 1..(int (rand 7)) + 8;

            system qw{ksetup.exe /setcomputerpassword}, $password;

            print "Principal: host/", lc( $ENV{COMPUTERNAME} ), ".$domain\n";
            print "Password: $password\n";

            Then, use kdamin to add an equivalent principal to the Kerberos database, using the same password as above. Use the -e rc4-hmac:normal encryption option if adding a principal for a Windows XP system.

            kadmin: ank -e rc4-hmac:normal host/client.example.org

          • User Mapping
          • User mapping translates local accounts to the Kerberos domain. See module:users for user account management under CFEngine.

            $ ksetup.exe /mapuser * *

          Samba

          Windows clients can authenticate to Samba using Kerberos. Use Samba version 3.0.14a or higher on the server, and enable Kerberos support in the smb.conf configuration file.

          [global]
          use kerberos keytab = yes
          realm = EXAMPLE.ORG
          security = ads

          Multiple host and cifs principals must be created for each Samba server, as principals are case sensitive, and Windows systems may randomly start using Server.example.org or SERVER.EXAMPLE.ORG when connecting. Extract these principals to the /etc/krb5.keytab file on each Samba server.

          kadmin: ank -randkey host/server.example.org
          kadmin: ank -randkey host/Server.example.org
          kadmin: ank -randkey host/SERVER.EXAMPLE.ORG
          kadmin: ank -randkey cifs/server.example.org
          kadmin: ank -randkey cifs/Server.example.org
          kadmin: ank -randkey cifs/SERVER.EXAMPLE.ORG
          kadmin: ktadd -k /etc/krb5.keytab host/server.example.org
          kadmin: ktadd -k /etc/krb5.keytab host/Server.example.org
          kadmin: ktadd -k /etc/krb5.keytab host/SERVER.EXAMPLE.ORG
          kadmin: ktadd -k /etc/krb5.keytab cifs/server.example.org
          kadmin: ktadd -k /etc/krb5.keytab cifs/Server.example.org
          kadmin: ktadd -k /etc/krb5.keytab cifs/SERVER.EXAMPLE.ORG

          posted on 2013-05-18 15:04 ivaneeo 閱讀(354) 評論(0)  編輯  收藏 所屬分類: debian-企鵝中最像牛GNU牛力
          主站蜘蛛池模板: 肥城市| 大邑县| 乌兰浩特市| 阳城县| 本溪市| 东莞市| 宣武区| 黄平县| 抚州市| 彰化县| 玉林市| 新干县| 南靖县| 宜章县| 蓬安县| 玉门市| 航空| 嵩明县| 辽宁省| 莱阳市| 金门县| 苏州市| 灵石县| 广安市| 昌乐县| 射阳县| 和静县| 安吉县| 峨边| 阳朔县| 斗六市| 怀来县| 江津市| 鄂伦春自治旗| 海兴县| 平塘县| 门头沟区| 宁德市| 钦州市| 清远市| 孝感市|