[32304] in Kerberos
Re: passwd, kpasswd
daemon@ATHENA.MIT.EDU (Matej Zagiba)
Tue May 4 16:32:10 2010
Message-ID: <4BE070C6.1040301@fmph.uniba.sk>
Date: Tue, 04 May 2010 21:08:54 +0200
From: Matej Zagiba <matej.zagiba@fmph.uniba.sk>
MIME-Version: 1.0
To: kerberos@mit.edu
In-Reply-To: <20100504170356.268640@gmx.net>
Content-Type: text/plain; charset="utf-8"
Errors-To: kerberos-bounces@mit.edu
Content-Transfer-Encoding: 8bit
hi,
usually you don't want those to be in sync. When user changes password on onemachine (and kerberos) change is not propagated to other machines, so thigs break.And there is always problem with kpasswd, changes with kpasswd will not bepropagated at all.
My approach is to have two sets of accounts - 'local' with password in /etc/shadowand 'global' with kerberos authentication. I use LDAP to propagate globalaccounts and I do not use LDAP authentication, no password is stored in LDAP.you can even have third set of accounts - "LDAP" accounts which authenticate against LDAPand do not have any kerberos principal associated. And for testing, try account with* instead of password in /etc/passwd.
So You can try something like this:
password requisite pam_pwcheck.so nullok cracklibpassword sufficient pam_unix2.so nullokuse_authtokpassword sufficient pam_krb5.so nullok use_authtokpassword required pam_deny.so
Matej
On 05/04/2010 07:03 PM, thom_schu@gmx.de wrote:> Hi there,> I just installed a Kerberos5-Server to use for authentication on hosts via ssh (all hosts + server are Linux-machines). An Entry in the Kerberos-Database for the user is not enough, the user also must have an account on the host he wants to log in (right now a shadow-passwd, but later I want ldap).> But this means, the user has 2 passwords, one in the Kerberos-Database, another one in shadow-passwd. The user can change his Kerberos-password with kpasswd and the account-password with passwd.> But I would like that the user changes both passwords using only passwd - is this possible ?> I tested some different configurations in /etc/pam.d/common-password, the last one was :>> password requisite pam_pwcheck.so nullok cracklib> password required pam_unix2.so nullok> password required pam_krb5.so nullok>> But never it was a clear solution, sometimes I didnt even know what was going on. For instance after the user changed the password, but then the Kerberos-login didnt work anymore, I got errors like "wrong principal in request" or the user couldn't login anymore with the normal login when he "came" from outside the realm.>> Can someone give me some help how to make a clean solution ?>> thanks>> gizmo11> --> GRATIS für alle GMX-Mitglieder: Die maxdome Movie-FLAT!> Jetzt freischalten unter http://portal.gmx.net/de/go/maxdome01> ________________________________________________> Kerberos mailing list Kerberos@mit.edu> https://mailman.mit.edu/mailman/listinfo/kerberos
________________________________________________Kerberos mailing list Kerberos@mit.eduhttps://mailman.mit.edu/mailman/listinfo/kerberos