Hi all,can somebody s= hed some light on this issue ?We are trying to = switch between kerberos realms ( and servers )=2Eorig= inal : X=2ECOMnew : X=2EBIZcell : x=2EcomI have created a new kerberos se= rvice principal afs/x=2Ec= om@X=2EBIZ in the new kerberos server=2EI ha= ve added the realm to the krb5=2Econf file=2EOn the client, I can kinit / aklog for b= oth the user@X=2ECOM an= d user@X=2EBIZBoth give me a token for afs-UID 1000=2E
Dr. Ir. Tim Piessens Gaston Geenslaan 14, 3001 Leuven, Belgium "The information = contained in this e-mail may be confidential." |
![]() |
On 15 Jan 2018, at 13:08, brandon s allbery kf8nh <ballbery@sinenomine.net> wrote:Is that literally all you did as setup? If so, you would = indeed be able to get tokens, but the servers would not recognize their = keys and would reject the tokens.
It sounds like the correct extra steps for your case are to make the = following changes on the AFS database servers:
(1) create a file /etc/openafs/server/krb.conf containing a single line, = with the two Kerberos realms on it separated by spaces (that is, "X.COM X.BIZ")
(2) extract the afs cell principal in the X.BIZ domain to a keytab, and = then add that to /etc/openafs/server/rxkad.keytab.
# ktutil
ktutil: rkt /etc/openafs/server/rxkad.keytab
ktutil: rkt /path/to/new/keytab
ktutil: wkt /etc/openafs/server/rxkad.keytab
Note that the new principal must have a different kvno from the old, and = that extracting it from the KDC will generate a new key and increment = its kvno.
(If for some reason you are using openafs configured in legacy mode, = that may be /usr/afs/etc/krb.conf and/or /usr/afs/etc/KeyFile. If you = are using KeyFile, you will need to use the asetkey utility to = manipulate it, not ktutil.)On January 15, 2018 6:49:37 AM EST, Tim Piessens = <piessens@icsense.com> wrote:Hi all,can somebody = shed some light on this issue ?We are trying = to switch between kerberos realms ( and servers ).original : X.COMnew : X.BIZcell : x.comI have created a new kerberos service = principal afs/x.com@X.BIZ in the new kerberos = server.I have added the realm to the krb5.conf = file.On = the client, I can kinit / aklog for both the user@X.COM and user@X.BIZBoth give me a = token for afs-UID 1000.But when I try to access a folder with the X.COM token, it works, with = the X.BIZ token, I get a permission denied.What could be the root cause = ?How can I debug this ?Thanks,Tim
--
Sent from my Android device with K-9 Mail. Please excuse my = brevity.
i try so setup windows 10, heimdal kerberos for windows and network idendity manager.
--=20 Dirk Heinrichs <dirk.heinrichs@altum.de> GPG Public Key: D01B367761B0F7CE6E6D81AAD5A2E54246986015 Sichere Internetkommunikation: http://www.retroshare.org Privacy Handbuch: https://www.privacy-handbuch.de--------------4B5FF89B66DD8A1F859E7B00-- --nKDLElbXMWFolsU0tcNSEQ8QmP4qTNjL6-- --h9cJOC1LE8uBhQsPfyDd4WkQLzYVHKapf Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEJgWJ3LIo7zNO9tmf0p7rxfc7RqsFAlpiELsACgkQ0p7rxfc7 RqvJFhAAzWJ+8lrFjJRdlwdlEa9gy3ivnbvT0eTKnNpjQ2VZlKDiyB0Y2lrcyx2F fXMrJmb9ljKQuGusHvWRYsHwHIsx7zTwa3RgE0c1yV1i61Q0EjtCZ89lEs/I2hyY n7XGS+XLXFy+iBzsSSPBJSI6lCQ/YC4FWtlX5TrtxKD15CsDrGoxE/6LUlWU25hO 6/jcloCgcBuvWnXgPIE8jnajgpBVinI/MTvNexkAhwIZMggky9aaBRz3cqzMphhH uiaMeNRVTOqpwr9hRmHORzL+s8vy6gprooqDyKkgutQVlnPCMfo9DT8sCX+X8dY3 yD5iXWoeVgCXTngjcp7aQ0Vf6YC3nTZNlBgFIQBgP/nTypkOp2GBYbNGNwv8JOB7 ikbbdGir9cWn27gzsS6nWdtK9mTkr+5S2NL1mlakObXqkJbEbHMo39VFdVYLMPK+ w52h19zgYDQM4lyNRwQjfLt3KjKa2ky98LRGp+k1tIa301zUouYYA1lqCcXpB2a0 wlQueyEkQNbVYc8wNtWVlK/FW7bpEnNZIEYoWQ4agJ5dTnnFwDZkLJUgvJuZSacR LsFuPKczlZW4HKihI1tZ6+i0wLQGuax6E9jzgy6KQAFJCiWbYWLMaB+aZrpcy0Yd Slqw6MXxoElPWamtDetZqxwrm/mAkRUrDj1MyU/xrufUiI4SqPQ= =079r -----END PGP SIGNATURE----- --h9cJOC1LE8uBhQsPfyDd4WkQLzYVHKapf-- From andreas.ladanyi@kit.edu Mon Jan 22 09:19:40 2018 From: andreas.ladanyi@kit.edu (Andreas Ladanyi) Date: Mon, 22 Jan 2018 10:19:40 +0100 Subject: [OpenAFS] Windows 10, OpenAFS 1.7, heimdal 7.4 kerberos enctype issue In-Reply-To:
I dont know why and whats the difference but after setting up this package it works.Am 19.01.2018 um 09:28 schrieb Andreas Ladanyi:
i try so setup windows 10, heimdal kerberos for windows and network idendity manager.
You don't need all this anymore nowadays. The Auristor installer should contain all you need.
HTH...
   Dirk
-- Dirk Heinrichs <dirk.heinrichs@altum.de> GPG Public Key: D01B367761B0F7CE6E6D81AAD5A2E54246986015 Sichere Internetkommunikation: http://www.retroshare.org Privacy Handbuch: https://www.privacy-handbuch.de
Folks, re-sending this = because the first try never hit the list - perhaps mail with attachments ar= e silently dropped or held for manual moderation?=C2=A0 I'd originally = attached an image of the stack trace.=C2=A0 I'll host it and reply to t= his with a=C2=A0 URL link in case that would also result in a drop or moder= ation.Anyhow:=C2=A0=C2=A0=In testing the new RHEL 7.5 beta, we've disco= vered that hosts using AFS fail to boot after the upgrade, with Openafs 1.6= .22.1 installed.=C2=A0=C2=A0We are wondering if some of the= non-guaranteed kernel ABIs that OpenAFS uses might have changed with the l= atest kernel provided in RHEL 7.=C2=A0=C2=A0I've attach= ed a picture of the trace.Anyone else kicking the tires on = the new RHEL yet?Thanks!