[37826] in Kerberos

home help back first fref pref prev next nref lref last post

Re: OTP and kadmin

daemon@ATHENA.MIT.EDU (Benjamin Kaduk)
Sun Jan 8 13:33:41 2017

Date: Sun, 8 Jan 2017 12:33:26 -0600
From: Benjamin Kaduk <kaduk@mit.edu>
To: Felix Weissbeck <contact-kerberos@w7k.de>
Message-ID: <20170108183326.GC8460@kduck.kaduk.org>
MIME-Version: 1.0
Content-Disposition: inline
In-Reply-To: <164906241.8Ksf5XxzVl@entenkatapult>
Cc: kerberos@mit.edu
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: kerberos-bounces@mit.edu

On Sun, Jan 08, 2017 at 05:02:59PM +0100, Felix Weissbeck wrote:
> Hello,
> 
> i have recently reconfigured my MIT-Kerberos setup to use PKINIT / OTP and 
> RADIUS for my admins. In my setup administrators have two accounts: one 
> "username@REALM" for regular user-stuff like mail...  and "username/
> admin@REALM" for root-logins with ssh and other administrative purposes.
> This all works just nicely and i am a huge fan.
> Users can get their tickets with a password & yubikey and then log onto the 
> servers as root.
> 
> But since i had to ''kadmin:  purgekeys -all user/admin"  in order to force 
> them to 2FA i can no longer use "kadmin -p user/admin" from a remote host.
> 
> root@ldap:~# kadmin -p fe/admin
> Authenticating as principal fe/admin with password.
> kadmin: Invalid argument while initializing kadmin interface
> 
> while my logfiles show:
> Jan  8 15:38:13 kerberos2 krb5kdc[28363]: AS_REQ xxxxxxxxx: NEEDED_PREAUTH: 
> fe/admin@W7K.DE for kadmin/admin@W7K.DE, Additional pre-authentication 
> required
> 
> I have not changed the kadm5.acl on the kdc/kadmin so they should still be 
> allowed to do this (*/admin * ) 
> 
> I guess the problem is, that the kadmin-tool does not understand how to 
> provide the preauth (just like kinit would without the otp module).
> 
> So my question is: Did i miss anything? Is there any possibility to use kadmin 
> remotely with otp/2FA? Or is this not possible at the moment and users have to 
> use kadmin.local?

One thing to try would be separating getting tickets and authenticating
to kadmin, aka

kinit -c FILE:/tmp/krb5cc_admin -S kadmin/admin -r5m -l5m user/admin
kadmin -c FILE:/tmp/krb5cc_admin -p user/admin

That would make it more clear if it is just a failure in the kadmin client logic.

-Ben
________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

home help back first fref pref prev next nref lref last post