Configuring Kerberos for Solaris

Wyllys Ingersoll wyllys.ingersoll at sun.com
Tue Mar 25 11:15:52 EST 2003


Adams, Ann (A.M.) wrote:
> Ok,
> 
> I have to ask, does SUN have a kerberized hpptd?  

No, the person who  posed the question was trying to configure apache to use
PAM to perform the authentication via Kerberos.    This is NOT the same
as having a truly "Kerberized" http daemon.

Having "proper" Kerberos (or GSSAPI) authentication to the web server requires
a browser which also supports the authentication protocol and currently, as far as I
know, only Microsofts IE supports native GSSAPI authentication and it only works
when talking to an IIS web server.

-Wyllys

 > I thought they only had the standard network services.  I have not seen a reference 
by either
 > SUN, HP, or MIT to a kerberized httpd. Has SUN done any development on web 
authentication via Kerberos?
> 
> I was looking around some of the university sites to see if there was a kerberized web authentication modules available for testing.  My impression was that they had been written but nothing publicly available to test.  
> 
> Dartmouth had publicly available a Kerberos IV module, but I didn't see anything for Kerberos V.  CUSSP is a perl5 module from Cornell University that is referenced below.  Both of these are well documented and clear, but it doesn't appear to continue into the Kerberos V environment.
> 
>  excerpt from Dartmouth web site below:....
> 		Kerberos authentication can be invoked from a CGI script.
> 		There are Perl interfaces to do this. 
> 		The example below shows a CGI that authenticates the user,
> 		 then displays the name(s) and information from the
> 		 ticket(s) that were generated.
> 
> 		In Perl, you can use the GetK4Ticket function to validate a user.
> 		This function is defined in the CUSSP library.
> 
> 		GetK4Ticket is defined as:
> 		($rc, $em, %tckt) = CUSSP::GetK4Ticket("WWW-agent",
> 		 "WWW", $cgi->remote_addr(), undef, $ENV{'REMOTE_PORT'}); 
> 
> 
> If anything I have stated in incorrect, I request correction.  If there are other resources I should be looking at please indicate.
>
> 
> regards,
> Ann Adams
> Computer Architect/SIE
> Ford Motor Company
> 
> 
> 
> -----Original Message-----
> From: Wyllys Ingersoll [mailto:wyllys.ingersoll at sun.com]
> Sent: Monday, March 24, 2003 7:50 PM
> To: Ganesh
> Cc: kerberos at mit.edu
> Subject: Re: Configuring kerberos for Solaris
> 
> 
> Ganesh wrote:
> 
>>I'm trying to configure kerberos, to authenticate the
>>users through Web. I've successfully compiled
>>mod_auth_pam.c on Solaris 8 and am able to authenticate
>>the users, if I use pam_unix.so.1 in my pam.conf file.
>>But if I try to authenticate by using pam_krb5.so.1
>>it fails.
>>
>>I'm using the pam_krb5.so.1 which is shipped along with solaris2.8.
> 
> 
> If you are using the pam_krb5 that shipped with Solaris 2.8 then you
> also need to be using the SEAM package for Solaris 8 (free download
> from www.sun.com).   If you go that route, I recommend making sure
> you have all the latest pam_krb5 and SEAM related patches.
> 
> If you are determined to stick with the MIT Kerberos libraries and not
> use the Solaris Kerberos stuff, then you should probably get a different
> pam_krb5 module (http://www.fcusack.com is one such module).
> 
> -Wyllys
> 
> 
>>A snap shot of my pam.conf file :
>>
>># The commented line works fine
>>#
>>httpd   auth sufficient   /usr/lib/security/$ISA/pam_krb5.so.1
>>#httpd   auth required   /usr/lib/security/$ISA/pam_unix.so.1
>>
>>httpd   account  sufficient     /usr/lib/security/$ISA/pam_krb5.so.1
>>#httpd   account required       /usr/lib/security/$ISA/pam_unix.so.1
>>
>>My /etc/krb5/krb5.conf file ..
>>
>>[libdefaults]
>>   default_realm = INDIA.HP.COM
>>   default_tkt_enctypes = DES-CBC-CRC
>>   default_tgs_enctypes = DES-CBC-CRC
>>   ccache_type = 2
>>
>>[realms]
>>   INDIA.HP.COM = {
>>      kdc = nt40239.india.hp.com:88
>>      admin_server = nt40239.india.hp.com:749
>>      default_domain = india.hp.com
>>}
>>
>>[domain_realm]
>> .india.hp.com = INDIA.HP.COM
>> india.hp.com = INDIA.HP.COM
>>
>>[logging]
>>        kdc = FILE:/var/log/krb5kdc.log
>>        admin_server = FILE:/var/log/kadmin.log
>>        default = FILE:/var/log/krb5lib.log
>>
>>I've also updated the /etc/services file to look into my
>>KDC server.
>>
>>My kDC server(Linux server) is up and running as I'm 
>>able to authenticate the users, with the same KDC if 
>>the client is HP-Ux m/c.
>>
>>Is that I've to make any changes in my krb5.conf file or
>>have to rebuild the pam_krb5.so file ? Please give your
>>inputs!
>>
>>TIA,
>>Ganesh.
>>________________________________________________
>>Kerberos mailing list           Kerberos at mit.edu
>>https://mailman.mit.edu/mailman/listinfo/kerberos
> 
> 
> 
> ________________________________________________
> Kerberos mailing list           Kerberos at mit.edu
> https://mailman.mit.edu/mailman/listinfo/kerberos




More information about the Kerberos mailing list