[OpenAFS] Re: OpenAFS 1.6.0 with Microsoft Active Directory 2008
- Questions about DES
Jason Edgecombe
jason@rampaginggeek.com
Tue, 10 Jan 2012 18:25:41 -0500
Would you dump that into the bug tracker or the wiki for future
reference? Updating the docs would be ideal ;)
Thanks,
Jason
On 01/10/2012 11:39 AM, Jeff White wrote:
> I decided to scrap my Windows box and start over again. I was able to
> get it work this time but I don't know what was different that made it
> work. I am able to get a ticket as the AFS principal and things seem
> to be working, at least until I run into the next problem. For those
> who care these are my notes from the one that worked:
> *
>
> 10. On the Windows Active Directory server, enable DES encryption
> types for Kerberos
> 1. Create a GPO called 'Allow_DES'
> 2. Configure the following entry to allow all encryption types
> listed
> 1. Computer Configuration -> Policies -> Windows Settings
> -> Local Policies -> Security Options -> Networking
> security: Configure encryption types allowed for
> Kerberos
> 3. Link the 'Allow_DES' GPO to the 'Domain Controllers' OU.
> 4. Reboot.
> 11. Create a user in AD called 'afs-pitt-edu-cell'.
> 12. In the settings for the AFS user check 'Use Kerberos DES
> encryption types for this account' then change the password.
> 13. Export the keytab for it. Note the KVNO.
> 1. ktpass -princ afs/pitt.edu@PITT.EDU -mapuser
> afs-pitt-edu-cell -pass * -crypto DES-CBC-CRC +rndpass
> /mapop add +desonly /ptype KRB5_NT_PRINCIPAL +dumpsalt -out
> afs-pitt-edu-cell.keytab
> 14. Copy the keytab to afs-dev-03.cssd as
> /etc/afs-pitt-edu-cell.keytab and make it root readable
> 1. chmod 600 /etc/afs.keytab
> 15. Using the KVNO from earlier add the keytab to AFS
> 1. asetkey add 4 /etc/afs.keytab afs/pitt.edu@PITT.EDU
>
> *
> Thanks to everyone for their help.
>
> Jeff White - Linux/Unix Systems Engineer
> University of Pittsburgh - CSSD
>
>
> On 01/10/2012 10:02 AM, Andrew Deason wrote:
>> On Mon, 09 Jan 2012 17:13:57 -0500
>> Jeff White<jaw171@pitt.edu> wrote:
>>
>>> Other possibly useful pieces of information:
>>>
>>> sAMAccountName: afs
>>> userPrincipalName: afs/pitt.edu@PITT.EDU
>> Just one more possible guess: are you sure you're talking to the
>> right kdc? I would expect the windows event log will log something when
>> a failure occurs when you do things like:
>>
>>>> [root@afs-dev-03 ~]# kinit afs/pitt.edu@PITT.EDU
>>>> kinit: Client not found in Kerberos database while getting initial
>>>> credentials
>> And maybe the log event would give more useful information. I don't
>> really expect it to, but you never know. A more accurate test may be to
>> try 'kinit -k -t afs.keytab afs/pitt.edu@PITT.EDU' or
>> 'kvno afs/pitt.edu@PITT.EDU' (after you've "kinit"d with a normal
>> princ), but of course the error you've already given is an issue.
>>
>