Can Standard Kerberos and AD serve the same domain w/out conflict?

uidzero Bainter uid__zero at hotmail.com
Thu May 4 16:09:15 EDT 2006


We currently have an existing Active Directory domain for our windows 
network, and I would like to setup Kerberos on the Unix side to service 
those systems.  (I would simply use windows as the KDC, but the username 
convention is "firstname<space>lastname" which is obviously inherently 
incompatible with *nix systems.

So lets say I have a setup like this:
userdom.org -- This is the domain where all the users and workstations live.
srvdom.org -- This is where all the servers (including unix servers) live.


[libdefaults]
   default_realm = KRB.SRVDOM.ORG

[realms]
   KRB.SRVDOM.ORG = {
      kdc = krb1.SRVDOM.org
      admin_server = kr1.SRVDOM.org
      default_domain = srvdom.org
   }

[domain_realm]
   SRVDOM.org = KRB.SRVDOM.ORG
   .SRVDOM.org = KRB.SRVDOM.ORG


With a set of existing servers like so:
   server1.srvdom.org
   server2.srvdom.org

with the above krb5.conf file.

Now, if I set this up, and there are no specific DNS entries to point to the 
KDC available, but rather I use the rather less scalable method of 
individually pointing each unix system at the correct KDC, will that work?  
Or will this cause a nightmare of conflict between AD and the Unix Kerberos 
implementation?  I'm not intimitely familiar with all of the kerberos 
protocols...is there any broadcasting going on, particularly from 
windows...that might cause nightmares with this?  Particularly if a windows 
client were to attempt to authenticate against a service on one of the unix 
systems?

What, if anything, do I need to be concerned about regarding the users 
actually attempting to authenticate from the userdom.org domain?  Do I need 
to have domain_realm mappings for that domain as well?

If I have to, I can setup a rogue DNS subdomain of krb5.srvdom.org and put 
everything in there, and subvert the existing dns infrastructure to support 
it by using dnscache to override where the servers look for dns and reverse 
information.  But that creates a really ugly situation, especially for 
reverse lookups.  So if I can do this, and not screw up the windows AD 
implementation, or the clients that would be using it, that's perfect.

_________________________________________________________________
FREE pop-up blocking with the new MSN Toolbar – get it now! 
http://toolbar.msn.click-url.com/go/onm00200415ave/direct/01/




More information about the Kerberos mailing list