[OpenAFS] Questions about AFS usage

Neulinger, Nathan nneul@umr.edu
Wed, 26 Feb 2003 12:59:48 -0600


Or even better, just forget all the trouble with afs token passing and =
switch to kerberos5 w/ gssapi.

-- Nathan

------------------------------------------------------------
Nathan Neulinger                       EMail:  nneul@umr.edu
University of Missouri - Rolla         Phone: (573) 341-4841
Computing Services                       Fax: (573) 341-4216


> -----Original Message-----
> From: Ray Link [mailto:rlink+@pitt.edu]=20
> Sent: Wednesday, February 26, 2003 12:57 PM
> To: openafs-info@openafs.org
> Subject: Re: [OpenAFS] Questions about AFS usage
>=20
>=20
> On Wed, 26 Feb 2003, Daniel [ISO-8859-1] Sw=E4rd wrote:
>=20
> > Doesn't that require that I actually have a token before trying to
> > authenticate with ssh-keys?
>=20
> Yes and no.
>=20
> There is a way to set up your .ssh directory so that you only need a
> token on the client side.  This configuration will enable the remote
> sshd to read your public keys without a token, while keeping your
> private keys safe.  The layout (and permissions for the PTS group
> system:anyuser) looks something like this:
>=20
>=20
>  ${HOME}   ( system:anyuser l )
>      |
>      +--- .ssh/   ( system:anyuser rl )
>             |
>             +--- private/   ( system:anyuser none )
>             |         |
>             |         +--- identity
>             |         +--- id_rsa
>             |         +--- id_dsa
>             |
>             +--- authorized_keys
>             +--- indentiy.pub
>             +--- id_rsa.pub
>             +--- id_dsa.pub
>             +--- identity --symlink--> ./private/identity
>             +--- id_rsa   --symlink--> ./private/id_rsa
>             +--- id_dsa   --symlink--> ./private/id_dsa
>             +--- known_hosts, known_hosts2, etc...
>=20
> The remote sshd only needs to read your public keys stored in the
> authorized_keys file, which it can read without a token.  As long as
> you have a token on the ssh-client side, you can read your=20
> private keys
> (symlinked into the place ssh expects to find them) for the=20
> client half
> of the key-based auth.
>=20
> A more detailed description of how and why this works can be found at:
>  =20
> https://lists.openafs.org/pipermail/openafs-> =
info/2002-May/004356.html
>=20
> The glaring drawback to this cheap hack is that your users have to set
> this up for themselves.  An alternative is to patch OpenSSH to pass
> AFS tokens before attempting key authentication.  Patches can be
> found at:
>   http://www.pitt.edu/~rlink/patches/
> and a description of the patches is archived at:
>  =20
> https://lists.openafs.org/pipermail/openafs-> =
info/2002-June/004768.html
>   (Note: the attached patch is broken, see the previous URL=20
> for a fixed one.)
>=20
> This seems to come up once every couple of months, so I think I might
> actually Wiki the info this time.
>=20
> =3D=3D=3D=3D Ray Link =3D=3D=3D University of Pittsburgh CSSD =
=3D=3D=3D=20
> rlink@pitt.edu =3D=3D=3D=3D
>=20
> For some reason I was confusing "SubGenius" with "GNU" there.
>         - The Cube, Forum 3000
>=20
> _______________________________________________
> OpenAFS-info mailing list
> OpenAFS-info@openafs.org
> https://lists.openafs.org/mailman/listinfo/openafs-info
>=20