[OpenAFS] ADS and MIT Kerberos transition auth continued
Eric Chris Garrison
ecgarris@iupui.edu
Wed, 01 Jul 2009 16:52:05 -0400
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Jeffrey Altman wrote:
> Eric Chris Garrison wrote:
>>> From: Andrew Deason <adeason@sinenomine.net>
>>>> I've added an afs service principal from each of two realms to the
>>>> KeyFile using asetkey. I've added both realms in /etc/krb.conf, the
>>>> first two lines of the file being the two realms.
>>> You probably want /usr/afs/etc/krb.conf (if using transarc paths), or
>>> /etc/openafs/server/krb.conf.
>> Thanks, that did help, I've gotten further now.
>>
>> What I'm seeing now though, is that although used asetkey to add the
>> service principal from the ADS realm to my test cell, permissions aren't
>> working as I'd expect.
>>
>> So, we have realm AFSTEST.IU.EDU and ADS.IU.EDU. Both in the KeyFile and
>> in the /usr/afs/etc/krb.conf and both listed in the /etc/krb5.conf.
>>
>> On a client machine, I can kinit as the original, as
>> ecgarris@AFSTEST.IU.EDU and can get permissions as expected to OpenAFS
>> directories with ACLs granted to OpenAFS user ecgarris.
>>
>> I would expect on a multi-realm cell, that I could come in as
>> ecgarris@ADS.IU.EDU and have the same permissions as
>> ecgarris@AFSTEST.IU.EDU, but I don't, I get permission denied. If I
>> create a file in an anyuser-writable directory, the UNIX permissions show
>> it as owned by ecgarris, but I still get Permission Denied when I try to
>> access directories owned by OpenAFS ecgarris.
>>
>> If I make the ONLY realm ADS.IU.EDU I have the same problem as well.
>>
>> Does this mean if we switch domains, all existing users will need extra
>> ACLs inserted to accommodate the new domain? Is there a better answer?
>> Am I just missing something simple?
>
> it means you have done something wrong.
I'm sure I have, I just don't know what yet.
> what adding multiple realm names to /usr/afs/etc/krb.conf tells the AFS
> services after a restart is that all of the specified realms should be
> considered as sources of local authentication identities. If the
> krb.conf file states
>
> ADS.IU.EDU AFSTEST.IU.EDU
It does.
> then both the name ecgarris@ADS.IU.EDU and ecgarris@AFSTEST.IU.EDU will
> be treated as "ecgarris".
They aren't.
> When debugging authentication you should turn auditing on for all of
> your services so that you can see what the authentication identities are
> from the perspective of each service.
I turned auditing on and I do see a difference in the fileserver audit:
ecgarris@AFSTEST.IU.EDU:
Wed Jul 1 15:59:13 2009 [7] EVENT AFS_SRX_FchStat CODE 0 NAME ecgarris
HOST 129.79.43.73 ID 32766 FID 536870918:1:1
...but as ecgarris@ADS.IU.EDU:
Wed Jul 1 15:58:37 2009 [6] EVENT AFS_Aud_Unauth CODE -1 STR AFS_SRX_StData
Wed Jul 1 15:58:37 2009 [6] EVENT AFS_SRX_StData CODE 0 NAME --UnAuth--
HOST 149.166.144.33 ID 32766 FID 536870933:2:2
So the ADS.IU.EDU user is showing as unauthorized? Strange that if I
create a file, its UNIX permissions show as owned by ecgarris though.
> I would also verify that the keytabs that you are using are in fact
> correct. You can do so using the MIT Kerberos kvno command. Obtain a
> TGT for ecgarris@ADS.IU.EDU and then issue:
>
> kvno -k <keytab> afs/afstest.iu.edu@ADS.IU.EDU
>
> If the key verifies then it can be imported into the AFS KeyFile and
> distributed to all of your services.
It does verify, with kvno = 6, which is no the same as the other service
principal's kvno.
So what else could be wrong?
Chris
- --
Eric Chris Garrison | Principal Mass Storage Specialist
ecgarris@iupui.edu | Indiana University - Research Storage
W: 317-278-1207 M: 317-250-8649 | Jabber IM: ecgarris@iupui.edu
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFKS8x1G2WsK8XoJWURArWGAJ9Hkb9cIuqtoJj3v4kR7fIdFYlLfgCfaq+z
eV7XbBY4PF/db9qkNq4eua0=
=i22i
-----END PGP SIGNATURE-----