multi-realm auth failing in DMZ, works for any specified default_realm
Jeremy Page
jeremy.page at gilbarco.com
Tue Mar 11 15:10:33 EDT 2014
I am trying to set up multi-realm authentication via SSH into an Ubuntu
box against a Windows 2008 AD forest with multiple AD domains/Kerberos
realms in it.
Inside our network this works as I would like, assuming users UIDs are
unique - usera at SITE.REALM.COM and userb at REALM.COM both can authenticate
(I am logging in with uid at server so not specifying a realm).
In our DMZ I can only log in via ssh if I am in the Kerberos realm
specified as the default_realm in krb5.conf.
kinit for NON default realms *works* as long as I specify the realm,
getent\ldapsearch pulls back the correct user information. No caching
(ccreds\nscd) is on the box. I can connect to the KDC's in question (as
long as I change the default realm I can log in with any user) so I
don't see anything being blocked but it seems like something must be.
I am not sure what the next step is to troubleshoot this issue, any
suggestions would be appreciated.
Using libpam-krb5 and libnss-ldap
[libdefaults]
default_realm = SITE.COMPANY.COM
udp_preference_limit = 1
krb4_config = /etc/krb.conf
krb4_realms = /etc/krb.realms
kdc_timesync = 1
ccache_type = 4
forwardable = true
proxiable = true
v4_instance_resolve = false
v4_name_convert = {
host = {
rcmd = host
ftp = ftp
}
plain = {
something = something-else
}
}
fcc-mit-ticketflags = true
[realms]
SITE.COMPANY.COM = {
kdc = site.company.com
admin_server = site.company.com
}
COMPANY.COM = {
kdc = company.com:88
admin_server = company.com
default_domain = company.com
}
[domain_realm]
.company.com = COMPANY.COM
company.com = COMPANY.COM
[logging]
default = SYSLOG:LOG_DEBUG
[login]
krb4_convert = true
krb4_get_tickets = false
Please be advised that this email may contain confidential
information. If you are not the intended recipient, please notify us
by email by replying to the sender and delete this message. The
sender disclaims that the content of this email constitutes an offer
to enter into, or the acceptance of, any agreement; provided that the
foregoing does not invalidate the binding effect of any digital or
other electronic reproduction of a manual signature that is included
in any attachment.
More information about the Kerberos
mailing list