[OpenAFS] [FOR TESTING] OpenAFS 1.3.85 RPMs for RHEL4 (i386, x86_64)

ted creedon tcreedon@easystreet.com
Fri, 15 Jul 2005 09:40:58 -0700


Chris,

There has apparently been a change in kadmim ktadd, it now prompts for -e
"keysaltlist"

It would be clearer it the prompt was "-e key:salt". 

MIT KRB5 V 1.4.1.

tedc
-----Original Message-----
From: openafs-info-admin@openafs.org [mailto:openafs-info-admin@openafs.org]
On Behalf Of Christopher Allen Wing
Sent: Friday, July 15, 2005 9:12 AM
To: ted creedon
Cc: openafs-info@openafs.org
Subject: Re: [OpenAFS] [FOR TESTING] OpenAFS 1.3.85 RPMs for RHEL4 (i386,
x86_64)

Ted,


On Fri, 15 Jul 2005, ted creedon wrote:

> You should try building aklog in the
> openafs source tree, not from the afs-krb5 source tree. Does that work?
> 
> >>>> No. In fact new make messages are being emitted stating that that 
> >>>> build
> step has been bybassed.


Did you enable krb5 when you ran ./configure?

You need to do something like:

 	./configure --with-krb5-config=/usr/kerberos/bin/krb5-config

(assuming that you are using MIT Kerberos 5, with a 'krb5-config' binary in
the given path)

I think that Heimdal also has a 'krb5-config' program, find out where it is
and it should work.


When you get the configure script to accept the krb5 stuff properly, aklog 
should build inside the openafs tree.


> >>>> There is also a bug in the sources preventing the
--enable-supergroups
> from compiling caused by
> >>>> an error in ptprocs.c: PT_LstGrps needs to be in quotes or added to
the
> .h file.

This is fixed in CVS.


> >>>> asetkey needs to be in the build tree if aklog is. Can't aklog
without
> asetkey and its not in the MIT krb5 sources.


There is 'setkey' in src/auth/setkey.c which you can use, and there is a 
copy of asetkey in src/WINNT.

I guess you should open a bug report in openafs-bugs@openafs.org if you 
want the unix asetkey as part of the standard build.


Anyway, asetkey is just a helper program that reads the key out of a 
keytab for you and writes it into the KeyFile automatically.

You can do it manually via

 	ktadd -k /some/keytab/file
 	klist -k -K -t /some/keytab/file

 	./setkey add <key value from klist> <kvno from klist>


Okay so maybe that's a little more involved :)


> >>>> Ken's README needs a small documentation mod: -e des-cbc-crc now
needs
> to be -e des-cbc-crc:normal

I believe that the salt type is irrelevant when you are using 'ktadd'; it 
only matters for keys derived from a password string. At least MIT krb5 
doesn't care if you do:

 	ktadd -e des-cbc-crc

it will create a random key with no salt. (which is what you expect since 
the key value is random, not the result of a hashed string)


> >>>> in kadmin.local: ktadd -k /etc/krb5.keytab -e des-cbc-crc:normal
> afs@YOUR.CELL.NAME
> >>>> Question: Not sure if afs@YOUR.CELL.NAME shouldn't be afs@YOUR.REALM.
> I.e. how do you get a token for cell "bigcell" at domain some.domain.com
> in realm SOME.DOMAIN.COM?


The preferred way to do this nowadays would be:

 	ktadd -k /some/keytab/file -e des-cbc-crc
afs/your.cell.name@YOUR.REALM


if you have more than 1 AFS cell which share a single Kerberos realm for 
authentication.


-Chris
wingc@engin.umich.edu
_______________________________________________
OpenAFS-info mailing list
OpenAFS-info@openafs.org
https://lists.openafs.org/mailman/listinfo/openafs-info