[OpenAFS] Kerberos 5, AFS, and no krb524d

Rodney M Dyer rmdyer@uncc.edu
Mon, 09 Jun 2003 12:16:01 -0400


At 09:51 AM 6/9/2003 -0500, Douglas E. Engert wrote:

>The end goal should be to keep AFS flexibly enough to work with any
>authentication system in a secure manor, and to not get it tied to closely
>to any one.  This may be some version of Kerberos or some other authentication
>system. AFS is a file system where the client and file server need to 
>communicate
>on behalf of some user who has rights to access files.

Well then the solution seems straight forward.  The OpenAFS group needs to 
create a standardized wrapper library for obtaining the AFS credential 
(token).  The "klog" command then needs to be renamed to "afslogon" and all 
references to anything kerberos needs to be stripped out of the code 
base.  Then, you just end up calling your authentication wrapper with the 
information to obtain the token.  The wrapper does the work of determining 
which authentication method you are using, getting the token, etc.  Gee, 
this hints of a mechanism like SASL.  The way I see it, AFS is way too 
dedicated to Kerberos.  OpenAFS and Kerberos share a common 
history.  Seperating the two is like cutting off an arm.

> > Hmm...just thinking...for the Windows users...so would it be possible to
> > create an AFS K5 service principle on Microsoft's AD server, then request
> > that service principle, strip it clean, then stuff it into the AFS token
> > cache?
>
>Yes, that is very possible.
>
>  I suppose the salts would be a problem here.  But, if you could do
> > this, you wouldn't need the krb524 code right?
>
>No, the salt has to do the authentication of the user. It has nothing
>to do with the actual AFS token. You are thinking it is a one setp process,
>but it is a two sete process, authentication to a third party, then obtaining
>the token.

Blinded by ignorance, you are correct.  First get TGT (auth), then get 
service ticket, convert the bits and stuff into cache?

So if I've setup my AD domain to trust a MIT Kerberos realms TGT, then I 
could just request my AFS service principle ticket from my AD server right?

Err, being ignorant here...how exactly would I install the AFS principle 
into the AD kerberos database?  What I mean is...I know that we have the 
"setspn.exe" utility available from Microsoft.  I'm just not sure what 
information I'd need to do this.

http://www.microsoft.com/windows2000/techinfo/reskit/tools/existing/setspn-o.asp

 From the readme...

http://www.coe.uncc.edu/~rmdyer/setspn_readme.txt

So, I need to setup the "account" for AFS first, then declare it a service 
principle with this tool?

Assuming I did this I'd have a valid Kerberos 5 AFS service principle on 
the AD that could be requested by the user through the SSPI interface?

Anybody care to elaborate?

Rodney