[4364] in Kerberos

home help back first fref pref prev next nref lref last post

Kerberos 5 - what to do after you install

daemon@ATHENA.MIT.EDU (Andrew Gross)
Sat Dec 17 06:31:31 1994

Date: Sat, 17 Dec 94 03:25:07 -0800
From: Andrew Gross <drew@drew.sdsc.edu>
To: kerberos@MIT.EDU


Hello,

   Hobbit has encouraged me to offer these instructions.  They come
from the K4 setup instructions, from looking at code, and from notes
on this mailing list.

   These are not the most clear instructions.  They are terse and are
no help if something is not working.  If there are comments/edits
to make these more useful to the public at large, I'll try to add them
in my copious free time.

Enjoy,
Andrew Gross
=========================================================================
From: grossa@sdsc.edu

> Can you send me the krb set up info?

   Ok, first...

In .../krb5/admin

   ./krb5_create

                Give it the master kerberos password

   ./krb5_stash

                Give it the master kerberos password

   ./kdb5_edit

                ldb

   You should see something like:
   (Replace DARK.UCSD.EDU with your realm)

entry: K/M@DARK.UCSD.EDU
entry: krbtgt/DARK.UCSD.EDU@DARK.UCSD.EDU

   These are the kerberos master and tgt service (clearly).
   Now add following principals with ark (random key since services):

kadmin/DARK.UCSD.EDU@DARK.UCSD.EDU
        for kadmin and kpasswd

   Now add user principals with ank (so you can set the password):

drew@DARK.UCSD.EDU
        vanilla user
drew/admin@DARK.UCSD.EDU
        for access to kadmin
drew/root@DARK.UCSD.EDU
        for v4 ksu

   Now add host principals (with ark):

host/dark@DARK.UCSD.EDU
host/drew.extern.ucsd.edu@DARK.UCSD.EDU
host/portnoy.sdsc.edu@DARK.UCSD.EDU

   Extract a v5srvtsb with:

xst host_name host

   Move this to .../krb5/v5srvtab .

   Add these to /etc/services:

# Real kerberos info
kerberos        88/udp          kdc             # Kerberos authentication--udp
kerberos        88/tcp          kdc             # Kerberos authentication--tcp
kerberos5       88/udp          kdc             # Kerberos authentication--udp
kerberos5       88/tcp          kdc             # Kerberos authentication--tcp
klogin          543/tcp                         # Kerberos authenticated rlogin
kshell          544/tcp         cmd             # and remote shell
kerberos-adm    749/tcp                         # Kerberos 5 admin/changepw
kerberos-adm    749/udp                         # Kerberos 5 admin/changepw
kerberos4       750/udp                         # Kerberos authentication--udp
kerberos4       750/tcp                         # Kerberos authentication--tcp
kerberos-sec    750/udp                         # Kerberos authentication--udp
kerberos-sec    750/tcp                         # Kerberos authentication--tcp
kerberos_master 751/udp                         # Kerberos authentication
kerberos_master 751/tcp                         # Kerberos authentication
krb_prop        754/tcp                         # Kerberos slave propagation
kftp            765/tcp                         # Kerberos ftp
kpop            1109/tcp                        # Pop with Kerberos
eklogin         2105/tcp                        # Kerberos encrypted rlogin
ekshell         2106/tcp                        # Kerberos encrypted rsh
#


   Now start the kdc:  .../krb5/sbin/krb5kdc &

   Try kinit, klist, and kdestroy - they should all work at this point.

   Next start kadmind as with kdc .  Now kadmin and kpasswd should work...

   Add the following file:

.../krb5/admin_acl_file:
#       Administrator Access Control List
#       Format:
#       Name    Privileges      Comments
#       Where Privileges is a string containing one or more of
#               "a"             Add New Principals
#               "c"             Change Passwords
#               "d"             Delete Current Principals
#               "i"             Inquire About Existing Principals
#               "m"             Modify Existing Principals
#               "*"             All Privileges
#jqsample/admin@realm   *
#tomjones/admin@realm   acim    # Note - May Not Delete
drew/admin@DARK.UCSD.EDU        *

   Change the last line to your admin principal.  Now try kadmin...

   Add this to /etc/inetd.conf :

# kerberos
klogin  stream  tcp     nowait  root    /krb5/sbin/krlogind Klogind
eklogin stream  tcp     nowait  root    /krb5/sbin/krlogind eKlogind
kshell  stream  tcp     nowait  root    /krb5/sbin/krshd    Kshd

   kill -HUP inetd .  Now add a ~/.k5login with your principal in
it,e.g.

drew@DARK.UCSD.EDU

   Now you should be able to rlogin, rsh and rcp to yourself.

   Now you need to make a host/?@R prin. for anyother host you want to
speak kerberos with and xst that into a v5srvtab for that host.

=========================================================================
My principal list:

Default:
entry: K/M@DREW
entry: krbtgt/DREW@DREW

Interrealm: (need same password and vno on both servers)
entry: krbtgt/DREW@RCS.COM
entry: krbtgt/RCS.COM@DREW

K4:
entry: changepw/kerberos@DREW

Services:
entry: kadmin/DREW@DREW

Host services:
entry: kftp/drew.sdsc.edu@DREW
entry: kftp/dark@DREW
entry: kftp/portnoy.sdsc.edu@DREW
entry: pop/drew.sdsc.edu@DREW
entry: pop/dark@DREW

Host entries:
entry: host/dark@DREW
entry: host/portnoy.sdsc.edu@DREW
entry: host/drew.sdsc.edu@DREW
entry: host/drew.extern.ucsd.edu@DREW

Me:
entry: drew@DREW
entry: drew/admin@DREW
entry: drew/root@DREW
entry: grossa@DREW

Other users:
entry: moreland@DREW
entry: okumoto@DREW
=========================================================================


home help back first fref pref prev next nref lref last post