<rt id="bn8ez"></rt>
<label id="bn8ez"></label>

  • <span id="bn8ez"></span>

    <label id="bn8ez"><meter id="bn8ez"></meter></label>

    ivaneeo's blog

    自由的力量,自由的生活。

      BlogJava :: 首頁 :: 聯系 :: 聚合  :: 管理
      669 Posts :: 0 Stories :: 64 Comments :: 0 Trackbacks

    Kerberos Server Configuration

    These notes are for MIT Kerberos 1.3 or higher.

    • /etc/krb5.conf
    • The /etc/krb5.conf configuration file should include rc4-hmac support under the [libdefaults] section. Windows XP uses rc4-hmac. However, do not include rc4-hmac in the default* encryption types, as older Unix clients may not support rc4-hmac.

      [libdefaults]
      default_realm = EXAMPLE.ORG
      default_etypes = des3-hmac-sha1 des-cbc-crc
      default_tkt_enctypes = des3-hmac-sha1 des-cbc-crc
      default_tgs_enctypes = des3-hmac-sha1 des-cbc-crc
      permitted_enctypes = des3-hmac-sha1 des-cbc-crc rc4-hmac
      dns_lookup_realm = false
      dns_lookup_kdc = true

    • kdc.conf
    • The kdc.conf configuration file on the Kerberos servers must support rc4-hmac as an encryption type.

      [realms]
      EXAMPLE.ORG = {
      database_name = /var/kerberos/krb5kdc/principal
      key_stash_file = /var/kerberos/krb5kdc/.k5.EXAMPLE.ORG
      supported_enctypes = des3-hmac-sha1:normal des-cbc-crc:normal ?
      rc4-hmac:normal
      }

    Windows Client Setup

    • Kerberos Configuration
    • Use the ksetup.exe command to add the site Kerberos servers.

      $ ksetup.exe /addkdc EXAMPLE.ORG kerberos-1.example.org
      $ ksetup.exe /addkdc EXAMPLE.ORG kerberos-2.example.org
      $ ksetup.exe /addkdc EXAMPLE.ORG kerberos.example.org
      $ ksetup.exe /addkpasswd EXAMPLE.ORG kerberos.example.org
      $ ksetup.exe /setrealm EXAMPLE.ORG

    • Host principals
    • Create host principals on each Windows client, then use the same password to create an equivalent principal in the MIT Kerberos database. If using an installation system such as Unattended, use a script to generate the random password and setup the host principal.

      #!/usr/bin/perl

      my $domain = 'example.org';

      my $password = '';
      my @chars = grep { /[[:print:]]/ and /\S/ } map { chr } 1..128;
      $password .= $chars[rand @chars] for 1..(int (rand 7)) + 8;

      system qw{ksetup.exe /setcomputerpassword}, $password;

      print "Principal: host/", lc( $ENV{COMPUTERNAME} ), ".$domain\n";
      print "Password: $password\n";

      Then, use kdamin to add an equivalent principal to the Kerberos database, using the same password as above. Use the -e rc4-hmac:normal encryption option if adding a principal for a Windows XP system.

      kadmin: ank -e rc4-hmac:normal host/client.example.org

    • User Mapping
    • User mapping translates local accounts to the Kerberos domain. See module:users for user account management under CFEngine.

      $ ksetup.exe /mapuser * *

    Samba

    Windows clients can authenticate to Samba using Kerberos. Use Samba version 3.0.14a or higher on the server, and enable Kerberos support in the smb.conf configuration file.

    [global]
    use kerberos keytab = yes
    realm = EXAMPLE.ORG
    security = ads

    Multiple host and cifs principals must be created for each Samba server, as principals are case sensitive, and Windows systems may randomly start using Server.example.org or SERVER.EXAMPLE.ORG when connecting. Extract these principals to the /etc/krb5.keytab file on each Samba server.

    kadmin: ank -randkey host/server.example.org
    kadmin: ank -randkey host/Server.example.org
    kadmin: ank -randkey host/SERVER.EXAMPLE.ORG
    kadmin: ank -randkey cifs/server.example.org
    kadmin: ank -randkey cifs/Server.example.org
    kadmin: ank -randkey cifs/SERVER.EXAMPLE.ORG
    kadmin: ktadd -k /etc/krb5.keytab host/server.example.org
    kadmin: ktadd -k /etc/krb5.keytab host/Server.example.org
    kadmin: ktadd -k /etc/krb5.keytab host/SERVER.EXAMPLE.ORG
    kadmin: ktadd -k /etc/krb5.keytab cifs/server.example.org
    kadmin: ktadd -k /etc/krb5.keytab cifs/Server.example.org
    kadmin: ktadd -k /etc/krb5.keytab cifs/SERVER.EXAMPLE.ORG

    posted on 2013-05-18 15:04 ivaneeo 閱讀(356) 評論(0)  編輯  收藏 所屬分類: debian-企鵝中最像牛 、GNU牛力
    主站蜘蛛池模板: 久久精品国产亚洲AV果冻传媒| 四虎永久免费地址在线网站| 亚洲Av熟妇高潮30p| 日韩精品无码免费专区网站| 久久国产成人精品国产成人亚洲| 日韩免费码中文在线观看| avtt亚洲天堂| 国产精品福利片免费看| 在线亚洲午夜理论AV大片| 日韩精品无码免费专区午夜| 亚洲欧洲日产国产综合网| 91嫩草免费国产永久入口| 亚洲一区二区三区在线| 成人无遮挡毛片免费看| 久久综合亚洲色hezyo| 亚洲乱码日产精品a级毛片久久| 一级视频在线免费观看| 亚洲AV无码一区二区三区DV| 久久伊人免费视频| 亚洲丝袜中文字幕| 日本人护士免费xxxx视频| 色多多A级毛片免费看| 亚洲爆乳无码专区| 亚洲免费综合色在线视频| MM1313亚洲精品无码久久| 国产亚洲AV手机在线观看| 日本免费一区二区三区四区五六区 | 在线观看亚洲人成网站| 国色精品卡一卡2卡3卡4卡免费| 亚洲成熟丰满熟妇高潮XXXXX| 久久久久亚洲AV成人网人人网站 | 免费被黄网站在观看| 人禽伦免费交视频播放| 婷婷久久久亚洲欧洲日产国码AV| 免费福利网站在线观看| 日本高清免费中文在线看| 亚洲成Av人片乱码色午夜| 永久免费看bbb| 在线毛片片免费观看| 亚洲人成色77777在线观看| 国产午夜亚洲精品午夜鲁丝片|