[29341] in Kerberos

home help back first fref pref prev next nref lref last post

Re: Kerberos initialisation error

daemon@ATHENA.MIT.EDU (Cov)
Thu Feb 21 07:15:26 2008

From: Cov <dgcoventry@gmail.com>
Date: Thu, 21 Feb 2008 04:14:27 -0800 (PST)
Message-ID: <3b81b456-e11e-4c9a-b2ac-fe349664ad24@q33g2000hsh.googlegroups.com>
Mime-Version: 1.0
X-Complaints-To: groups-abuse@google.com
Complaints-To: groups-abuse@google.com
To: kerberos@mit.edu
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: kerberos-bounces@mit.edu

Okay, /etc/krb5kdc/kdc.conf had to be edited as below:

++++++++++++++++++/etc/krb5kdc/kdc.conf+++++++++++++++++++++
[kdcdefaults]
    kdc_ports = 750,88

[realms]
IQETD.LAN = {
        database_name = /var/lib/krb5kdc/principal
        admin_keytab = FILE:/etc/krb5kdc/kadm5.keytab
        acl_file = /etc/krb5kdc/kadm5.acl
        key_stash_file = /etc/krb5kdc/stash
        kdc_ports = 750,88
        max_life = 10h 0m 0s
        max_renewable_life = 7d 0h 0m 0s
        master_key_type = des3-hmac-sha1
        supported_enctypes = des3-hmac-sha1:normal des-cbc-crc:normal
des:norma$
        default_principal_flags = +preauth
    }
+++++++++++++++ end of /etc/krb5kdc/kdc.conf++++++++++++++
Also I had to run "krb5_newrealm" to initialise the KDC database.

This give the following useful tips:

++++++++++++++++++++++++++++++++++++++++++++++++++
# krb5_newrealm
This script should be run on the master KDC/admin server to initialize
a Kerberos realm. It will ask you to type in a master key password.
This password will be used to generate a key that is stored in
/etc/krb5kdc/stash. You should try to remember this password, but it
is much more important that it be a strong password than that it be
remembered. However, if you lose the password and /etc/krb5kdc/stash,
you cannot decrypt your Kerberos database.
Loading random data
Initializing database '/var/lib/krb5kdc/principal' for realm
'IQETD.LAN',
master key name 'K/M@IQETD.LAN'
You will be prompted for the database Master Password.
It is important that you NOT FORGET this password.
Enter KDC database master key:
Re-enter KDC database master key to verify:


Now that your realm is set up you may wish to create an administrative
principal using the addprinc subcommand of the kadmin.local program.
Then, this principal can be added to /etc/krb5kdc/kadm5.acl so that
you can use the kadmin program on other computers. Kerberos admin
principals usually belong to a single user and end in /admin. For
example, if jruser is a Kerberos administrator, then in addition to
the normal jruser principal, a jruser/admin principal should be
created.

Don't forget to set up DNS information so your clients can find your
KDC and admin servers. Doing so is documented in the administration
guide.
++++++++++++++++++++++++++++++++++++++++++++++++++
________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

home help back first fref pref prev next nref lref last post