[4153] in Kerberos

home help back first fref pref prev next nref lref last post

Re: Adding Users en mass

daemon@ATHENA.MIT.EDU (Asokan)
Tue Nov 8 19:48:44 1994

To: kerberos@MIT.EDU
Date: Tue, 8 Nov 1994 17:39:17 GMT
From: nasokan@math.uwaterloo.ca (Asokan)

In article <39o5o9$7rh@merlin.nando.net>, Charles Hall <chall@nando.net> wrote:
>Is there an easy way to import a list of users and passwords into Kerberos? I tried
>just piping output to kadmin, but it doesn't seem to accept the passwords from a pipe.
>Am I also correct that there is no way to force Kerberos to show me the passwords
>it has in clear text? That at least might help me debug the pipe problem. I found
>"build_pwfile" on the dist. but I can't figure out what it does (even after reading the
>source!).
>

We use a locally hacked tool called "krap" to create principals
en masse and assign random passwords.  The random passwords
are stored on a secure machine.  Another tool called
"init_kpasswd" is available on a small set of "trusted"
multi-user machines.  It talks to a daemon called "init_kpasswdd"
on the machine that has the random password file, gets the random
initial password that is assigned to the invoker and uses it
to let the invoker change their password.  All this is for v4.
We still haven't migrated to v5 yet.  You can write a krap
equivalent by beating up on the kadmin code.  If you want
the functionality of init_kpasswd[d] as well, they are fairly
trivial client/server code.

If you are interested in looking at my code, I might be able
to to package it up and send it to you.  Let me know.

Another option (which is what we tried first) is to write
a front end to kadmin in expect.  We found expect to be slow
at that time (3 years ago).  Newer versions of expect may be faster.

BTW, appended is a locally written minimal man page for build_pwfile.

- Asokan

-----------------------------------------------------


NAME
     build_pwfile - build dbm files from a given list of words.

SYNOPSIS
     build_pwfile <file>

DESCRIPTION
     build_pwfile would read <file>, containing a list of bad
     passwords, and would build appropriate dbm files.  The files
     would be left under the kerberos database directory (by
     default /kerberos).  kadmind(8) would consult these dbm files
     when a principal wants to change its password.  Bad pass-
     words are disallowed by kadmind.

     Remember that if your kerberos administration server is an
     architecture that does not support the newer dbm, you'll
     have to touch the /kerberos/bad_passwd{.pag,.dir} files
     before they can be used.

FILES
     /kerberos/bad_passwd{,.pag,.dir}

SEE ALSO
     kadmind(8), kerberos(1)

AUTHOR
     Guess: Theodore Y. Ts'o, MIT Distributed Computing and Net-
     work Services

BUGS
     This man page was written at UW.

MIT Project Athena     Kerberos Version 4.0                     1


home help back first fref pref prev next nref lref last post