Incorrect Kerberos Auth Config File?

Chris cc lazyboy_2k at yahoo.com
Tue Nov 7 20:14:20 EST 2006


Will,

I use sol 10 + latest patches.  I have followed your suggestions and I'm still in the dark.  I'm also not able to ping KDC as you ask.  At this point, I have no ideas where else to troubleshoot.  Any helps are really appreciated.

Thanks,
-Chris



> 
> I'd like my AD users to be able to telnet into a solaris box using
> their existing AD login name & password as well.  Any ideas which
> parameter in pam.conf file do I have to add it?

What version of Solaris?  Realize that Solaris Kerberos prior to Solaris
10 does not support TCP which the AD may use in certain situations.

I know in Solaris 10 this should work in pam.conf:

# Kerberized telnet service
#
ktelnet auth required           pam_unix_cred.so.1
ktelnet auth binding            pam_krb5.so.1
ktelnet auth required           pam_unix_auth.so.1

See the examples section of 'man pam_krb5' for more.
Also look at verify_ap_req_nofail in 'man krb5.conf'.

> http://www.microsoft.com/technet/itsolutions/cits/interopmigration/unix/usecdirw/08wsdsu.mspx
> 
> # getent passwd 
> test01:x:65535:101::/export/home/test01:/sbin/sh
> 
> # kinit 
> Kinit (v5): can not contact any KDC for requested realm while getting
> initial credentials.
> 
> # tail -f /var/adm/messages
> ...
> dtsession [] PAM_KRB5 (sectcred): pam_setcred failed for root  (can not
> retrieve user credentials).
> 
> Here is my krb5.conf file:
> 
> [libdefaults]
>    default_realm = WHATEVER.COM
>    dns_lookup_realm = false
>    dns_lookup_kdc = true

Do you want to locate the KDC via the DNS servers?  Is so, why
specify in the realm section below?

>    default_tkt_enctypes = des-cbc-md5 des-cbc-crc
>    default_tgs_enctypes = des-cbc-md5 des-cbc-crc
> 
> [realms]
>    WHATEVER.COM = {
>       kdc = dc1.whatever.com

Can you ping the KDC?

>      admin_server = dc1.example.com
>      kpasswd_protocol = SET_CHANGE
>      default_domain = whatever.com
>      }
> 
> [domain_realm]
>      *.whatever.com = WHATEVER.COM
>       .whatever.com = WHATEVER.COM
      .whatever.com = WHATEVER.COM
       whatever.com = WHATEVER.COM

is better.

> [logging]
>         default = FILE:/var/krb5/kdc.log
>         kdc = FILE:/var/krb5/kdc.log
>         kdc_rotate = {
>         period = 1d
>         version = 10
>         }
> 
> [appdefaults]
>         kinit = {
>         renewable = true
>         forwardable= true
>         }
> 
> 
> Here is my pam.conf:
> 
> # login service (explicit because of pam_dial_auth)
> #
> login   auth requisite          pam_authtok_get.so.1
> login   auth required           pam_dhkeys.so.1
> # login   auth sufficient          pam_krb5.so use_first_pass
> login   auth required           pam_unix_cred.so.1
> login   auth required           pam_unix_auth.so.1
> login   auth required           pam_dial_auth.so.1
> #
> #
> # dtlogin (explicit to allow for separate control during
> # testing)
> #
> dtlogin auth requisite           pam_authtok_get.so.1
> dtlogin auth required           pam_unix_auth.so.1
> #
> #
> # su (explicit to provide failsafe root access during testing)
> #
> su      auth requisite          pam_authtok_get.so.1
> su      auth required           pam_unix_auth.so.1
> #
> # rlogin service (explicit because of pam_rhost_auth)
> #
> rlogin  auth sufficient         pam_rhosts_auth.so.1
> rlogin  auth requisite          pam_authtok_get.so.1
> rlogin  auth required           pam_dhkeys.so.1
> rlogin  auth required           pam_unix_cred.so.1
> rlogin  auth required           pam_unix_auth.so.1
> #
> # Kerberized rlogin service
> #
> krlogin auth required           pam_unix_cred.so.1
> krlogin auth binding            pam_krb5.so.1
> krlogin auth required           pam_unix_auth.so.1
> #
> # rsh service (explicit because of pam_rhost_auth,
> # and pam_unix_auth for meaningful pam_setcred)
> #
> rsh     auth sufficient         pam_rhosts_auth.so.1
> rsh     auth required           pam_unix_cred.so.1
> #
> # Kerberized rsh service
> #
> krsh    auth required           pam_unix_cred.so.1
> krsh    auth binding            pam_krb5.so.1
> krsh    auth required           pam_unix_auth.so.1
> #
> # Kerberized telnet service
> #
> ktelnet auth required           pam_unix_cred.so.1
> ktelnet auth binding            pam_krb5.so.1
> ktelnet auth required           pam_unix_auth.so.1
> #
> # PPP service (explicit because of pam_dial_auth)
> #
> ppp     auth requisite          pam_authtok_get.so.1
> ppp     auth required           pam_dhkeys.so.1
> ppp     auth required           pam_unix_cred.so.1
> ppp     auth required           pam_unix_auth.so.1
> ppp     auth required           pam_dial_auth.so.1
> #
> # Default definitions for Authentication management
> # Used when service name is not explicitly mentioned for authentication
> #
> other   auth requisite          pam_authtok_get.so.1
> other   auth required           pam_dhkeys.so.1
> other   auth required           pam_unix_cred.so.1
> other   auth required           pam_unix_auth.so.1
> #
> # passwd command (explicit because of a different authentication
> module)
> #
> passwd  auth required           pam_passwd_auth.so.1
> #
> # cron service (explicit because of non-usage of pam_roles.so.1)
> #
> cron    account required        pam_unix_account.so.1
> #
> # Default definition for Account management
> # Used when service name is not explicitly mentioned for account
> management
> #
> other   account requisite       pam_roles.so.1
> other   account required        pam_unix_account.so.1
> #
> # Default definition for Session management
> # Used when service name is not explicitly mentioned for session
> management
> #
> other   session required        pam_unix_session.so.1
> #
> # Default definition for  Password management
> # Used when service name is not explicitly mentioned for password
> management
> #
> other   password required       pam_dhkeys.so.1
> other   password requisite      pam_authtok_get.so.1
> other   password requisite      pam_authtok_check.so.1
> # other   auth sufficient         pam_krb5.so use_first_pass
> other   password required       pam_authtok_store.so.1
> 
> 
> Any helps are appreciated.
> Thanks,
> -Chris
> 
> 
> 
>  
> ---------------------------------
> Sponsored Link 
> 
> Talk more and pay less. Vonage can save you up to $300 a year on your phone bill. Sign up now.
> ________________________________________________
> Kerberos mailing list           Kerberos at mit.edu
> https://mailman.mit.edu/mailman/listinfo/kerberos

-- 
Will Fiveash
Sun Microsystems Inc.
Austin, TX, USA (TZ=CST6CDT)


 
---------------------------------
Sponsored Link

Mortgage rates near 39yr lows. $420,000 Mortgage for $1,399/mo - Calculate new house payment


More information about the Kerberos mailing list