Welcome to the Slackware Documentation Project

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
howtos:network_services:kerberizing_slackware_without_pam [2015/11/28 03:15 (UTC)]
jamesaxl
howtos:network_services:kerberizing_slackware_without_pam [2015/11/28 03:46 (UTC)] (current)
jamesaxl
Line 50: Line 50:
 /​usr/​kerberos/​sbin/​kdb5_util create -r EXAMPLE.COM -s /​usr/​kerberos/​sbin/​kdb5_util create -r EXAMPLE.COM -s
 </​code>​ </​code>​
-Extract the admin server keys to /​var/​krb5kdc/​kadm5.keytab.+**4.** ​Extract the admin server keys to /​var/​krb5kdc/​kadm5.keytab.
 <​code>/​usr/​kerberos/​sbin/​kadmin.local <​code>/​usr/​kerberos/​sbin/​kadmin.local
 kadmin.local:​ xst -k /​var/​krb5kdc/​kadm5.keytab kadmin/​admin kadmin/​changepw kadmin.local:​ xst -k /​var/​krb5kdc/​kadm5.keytab kadmin/​admin kadmin/​changepw
-Create host and other principals; extract to /​etc/​krb5.keytab+</​code>​ 
 +**5.** ​Create host and other principals; extract to /​etc/​krb5.keytab 
 +<​code>​
 kadmin.local:​ ank -randkey host/​fully.qualified.domain.name kadmin.local:​ ank -randkey host/​fully.qualified.domain.name
 kadmin.local:​ xst -k /​etc/​krb5.keytab host/​fully.qualified.domain.name kadmin.local:​ xst -k /​etc/​krb5.keytab host/​fully.qualified.domain.name
-Create admin, user principals+</​code>​ 
 +<​code>​ 
 +**6.** ​Create admin, user principals
 kadmin.local:​ ank krb5adminprinc/​admin kadmin.local:​ ank krb5adminprinc/​admin
 kadmin.local:​ ank krb5userprinc kadmin.local:​ ank krb5userprinc
 kadmin.local:​ quit kadmin.local:​ quit
 </​code>​ </​code>​
-**4.** Create startup script /​etc/​rc.d/​rc.krb5 +**7.** Create startup script /​etc/​rc.d/​rc.krb5 
-rc.krb5 - shamelessly ripped off from rc.samba from Slackware 13.0+<note important>​rc.krb5 - shamelessly ripped off from rc.samba from Slackware 13.0</​note>​
 <​code>​ <​code>​
 #!/bin/sh #!/bin/sh
Line 109: Line 113:
 esac esac
 </​code>​ </​code>​
-**5.** Start KDC daemons:+**8.** Start KDC daemons:
 <​code>​ <​code>​
 # chmod +x /​etc/​rc.d/​rc.krb5 # chmod +x /​etc/​rc.d/​rc.krb5
 # /​etc/​rc.d/​rc.krb5 start # /​etc/​rc.d/​rc.krb5 start
 </​code>​ </​code>​
-**6.** Remember to make the rc.krb5 script executable if you want the KDC to start automatically at boot.+**9.** Remember to make the rc.krb5 script executable if you want the KDC to start automatically at boot.
 Verify connectivity to KDC with kadmin, kinit: Verify connectivity to KDC with kadmin, kinit:
 <​code>​ <​code>​
Line 120: Line 124:
 $ klist $ klist
 $ kadmin -p krb5adminprinc/​admin $ kadmin -p krb5adminprinc/​admin
 +</​code>​
 +==== The Client ====
  
 +This procedure will result in a client capable of retrievving Kerberos tickets from a KDC and allow Kerberos principals to login at the console. Successful console login by a principal will generate tickets in the user's cache. Failed login by a principal (because the principal doesn'​t exist, or the wrong password was supplied) should fall through to local authentications (/​etc/​shadow). Note: the principal must be associated with an account on the system, either in the local passwd database or via a network system such as NIS or LDAP.
 +
 +**1.** Install krb5 always http://​slackbuilds.org/​repository/​14.1/​network/​krb5/​ :-).
 +**2.** Setup /​etc/​krb5.conf:​
 +**krb5.conf**
 +<​code>​
 +[domain_realm]
 +        example.com = EXAMPLE.COM
 +        .example.com = EXAMPLE.COM
 +
 +[libdefaults]
 +        default_realm = EXAMPLE.COM
 +        dns_kdc_lookup = true
 +        dns_realm_lookup = true
 +        forwardable = true
 +        renewable = true
 +
 +[realms]
 +
 +EXAMPLE.COM = {
 + kdc = kerberos-1.example.com:​88
 + kdc = kerberos-2.example.com:​88
 + admin_server = kerberos-1.example.com:​749
 +        }</​code>​
 +**3.** Verify kadmin, kinit working
 +<​code>​
 +$ kinit krb5userprinc
 +$ klist
 +$ kadmin -p krb5adminprinc/​admin
 +</​code>​
 +**4.** Add host principal, and extract host principal to /​etc/​krb5.keytab using kadmin and admin principal:
 +<​code>#​ kadmin -p krb5adminprinc/​admin
 +kadmin: ank -randkey host/​fully.qualified.domain.name
 +kadmin: xst -k /​etc/​krb5.keytab host/​fully.qualified.domain.name
 +kadmin: quit
 </​code>​ </​code>​
  ​====== Sources ======  ​====== Sources ======
 <!-- If you are copying information from another source, then specify that source --> <!-- If you are copying information from another source, then specify that source -->
-<​!-- ​* Original source: [[http://some.website.org/some/page.html]] ​-->+* Original source: [[http://arktur.shuttle.de/CD/Testpakete/​Kerberos/​krb5.html]]
 <!-- Authors are allowed to give credit to themselves! --> <!-- Authors are allowed to give credit to themselves! -->
 <!-- * Originally written by [[wiki:​user:​xxx | User X]] --> <!-- * Originally written by [[wiki:​user:​xxx | User X]] -->
-<​!-- ​* Contributions by [[wiki:​user:​yyy | User Y]] -->+* Contributions by [[wiki:​user:​jamesaxl ​| User jamesaxl]]
  
 <!-- Please do not modify anything below, except adding new tags.--> <!-- Please do not modify anything below, except adding new tags.-->
 <!-- You must remove the tag-word "​template"​ below before saving your new page --> <!-- You must remove the tag-word "​template"​ below before saving your new page -->
-{{tag>​howtos ​template}}+{{tag>​howtos ​network_services kerberizing_slackware_without_pam}}

In Other Languages
QR Code
QR Code howtos:network_services:kerberizing_slackware_without_pam (generated for current page)