[6856556] | 1 | <sect2>
|
---|
| 2 | <title>Configuring Heimdal</title>
|
---|
| 3 |
|
---|
| 4 | <sect3><title>Config files</title>
|
---|
| 5 | <para><filename>/etc/heimdal/*</filename></para>
|
---|
| 6 | </sect3>
|
---|
| 7 |
|
---|
| 8 | <sect3><title>Configuration Information</title>
|
---|
| 9 |
|
---|
[619dd53] | 10 | <sect4><title>Master KDC Server Configuration</title>
|
---|
| 11 |
|
---|
[6856556] | 12 | <para>
|
---|
| 13 | Create the Kerberos configuration file with the following command:
|
---|
| 14 | </para>
|
---|
| 15 |
|
---|
[cc75bcec] | 16 | <screen><userinput><command>install -d /etc/heimdal &&
|
---|
[22c4e1ee] | 17 | cat > /etc/heimdal/krb5.conf << "EOF"</command>
|
---|
[6856556] | 18 | # Begin /etc/heimdal/krb5.conf
|
---|
| 19 |
|
---|
| 20 | [libdefaults]
|
---|
[619dd53] | 21 | default_realm = <replaceable>[LFS.ORG]</replaceable>
|
---|
[6856556] | 22 | encrypt = true
|
---|
| 23 |
|
---|
| 24 | [realms]
|
---|
[619dd53] | 25 | <replaceable>[LFS.ORG]</replaceable> = {
|
---|
| 26 | kdc = <replaceable>[belgarath.lfs.org]</replaceable>
|
---|
| 27 | admin_server = <replaceable>[belgarath.lfs.org]</replaceable>
|
---|
[cc75bcec] | 28 | kpasswd_server = <replaceable>[belgarath.lfs.org]</replaceable>
|
---|
[6856556] | 29 | }
|
---|
| 30 |
|
---|
| 31 | [domain_realm]
|
---|
[619dd53] | 32 | .<replaceable>[lfs.org]</replaceable> = <replaceable>[LFS.ORG]</replaceable>
|
---|
[6856556] | 33 |
|
---|
| 34 | [logging]
|
---|
| 35 | kdc = FILE:/var/log/kdc.log
|
---|
| 36 | admin_server = FILE:/var/log/kadmin.log
|
---|
| 37 | default = FILE:/var/log/krb.log
|
---|
| 38 |
|
---|
| 39 | # End /etc/heimdal/krb5.conf
|
---|
| 40 | <command>EOF</command></userinput></screen>
|
---|
| 41 |
|
---|
| 42 | <para>
|
---|
| 43 | You will need to substitute your domain and proper hostname for the
|
---|
| 44 | occurances of the belgarath and lfs.org names.
|
---|
| 45 | </para>
|
---|
| 46 |
|
---|
| 47 | <para>
|
---|
| 48 | <userinput>default_realm</userinput> should be the name of your domain changed to ALL CAPS.
|
---|
| 49 | This isn't required, but both Heimdal and <acronym>MIT</acronym>
|
---|
| 50 | recommend it.
|
---|
| 51 | </para>
|
---|
| 52 |
|
---|
| 53 | <para>
|
---|
| 54 | <userinput>encrypt = true</userinput> provides encryption of all traffic between kerberized
|
---|
| 55 | clients and servers. It's not necessary and can be left off. If you
|
---|
| 56 | leave it off, you can encrypt all traffic from the client to the server
|
---|
| 57 | using a switch on the client program instead.
|
---|
| 58 | </para>
|
---|
| 59 |
|
---|
| 60 | <para>
|
---|
| 61 | The <userinput>[realms]</userinput> parameters tell the client programs where to look for the
|
---|
| 62 | <acronym>KDC</acronym> authentication services.
|
---|
| 63 | </para>
|
---|
| 64 |
|
---|
| 65 | <para>
|
---|
| 66 | The <userinput>[domain_realm]</userinput> section maps a domain to a realm.
|
---|
| 67 | </para>
|
---|
| 68 |
|
---|
| 69 | <para>
|
---|
| 70 | Store the master password in a key file using the following commands:
|
---|
| 71 | </para>
|
---|
| 72 |
|
---|
| 73 | <screen><userinput><command>install -d -m 755 /var/lib/heimdal &&
|
---|
| 74 | kstash</command></userinput></screen>
|
---|
| 75 |
|
---|
| 76 | <para>
|
---|
| 77 | Create the <acronym>KDC</acronym> database:
|
---|
| 78 | </para>
|
---|
| 79 |
|
---|
| 80 | <screen><userinput><command>kadmin -l</command></userinput></screen>
|
---|
| 81 |
|
---|
| 82 | <para>
|
---|
| 83 | Choose the defaults for now. You can go in later and change the
|
---|
| 84 | defaults, should you feel the need. At the
|
---|
| 85 | <userinput>kadmin></userinput> prompt, issue the following statement:
|
---|
| 86 | </para>
|
---|
| 87 |
|
---|
[619dd53] | 88 | <screen><userinput><command>init <replaceable>[LFS.ORG]</replaceable></command></userinput></screen>
|
---|
[6856556] | 89 |
|
---|
| 90 | <para>
|
---|
| 91 | Now we need to populate the database with principles (users). For now,
|
---|
| 92 | just use your regular login name or root.
|
---|
| 93 | </para>
|
---|
| 94 |
|
---|
[619dd53] | 95 | <screen><userinput><command>add <replaceable>[loginname]</replaceable></command></userinput></screen>
|
---|
[6856556] | 96 |
|
---|
| 97 | <para>
|
---|
| 98 | The <acronym>KDC</acronym> server and any machine running kerberized
|
---|
| 99 | server daemons must have a host key installed:
|
---|
| 100 | </para>
|
---|
| 101 |
|
---|
[619dd53] | 102 | <screen><userinput><command>add --random-key host/<replaceable>[belgarath.lfs.org]</replaceable></command></userinput></screen>
|
---|
[6856556] | 103 |
|
---|
| 104 | <para>
|
---|
| 105 | After choosing the defaults when prompted, you will have to export the
|
---|
| 106 | data to a keytab file:
|
---|
| 107 | </para>
|
---|
| 108 |
|
---|
[619dd53] | 109 | <screen><userinput><command>ext host/<replaceable>[belgarath.lfs.org]</replaceable></command></userinput></screen>
|
---|
[6856556] | 110 |
|
---|
| 111 | <para>
|
---|
| 112 | This should have created two files in
|
---|
| 113 | <filename class="directory">/etc/heimdal</filename>;
|
---|
| 114 | <filename>krb5.keytab</filename> (Kerberos 5) and
|
---|
| 115 | <filename>srvtab</filename> (Kerberos 4). Both files should have 600
|
---|
| 116 | (root rw only) permissions. Keeping the keytab files from public access
|
---|
| 117 | is crucial to the overall security of the Kerberos installation.
|
---|
| 118 | </para>
|
---|
| 119 |
|
---|
| 120 | <para>
|
---|
| 121 | Eventually, you'll want to add server daemon principles to the database
|
---|
| 122 | and extract them to the keytab file. You do this in the same way you
|
---|
| 123 | created the host principles. Below is an example:
|
---|
| 124 | </para>
|
---|
| 125 |
|
---|
[619dd53] | 126 | <screen><userinput><command>add --random-key ftp/<replaceable>[belgarath.lfs.org]</replaceable></command></userinput></screen>
|
---|
[6856556] | 127 |
|
---|
| 128 | <para>
|
---|
| 129 | (choose the defaults)
|
---|
| 130 | </para>
|
---|
| 131 |
|
---|
[619dd53] | 132 | <screen><userinput><command>ext ftp/<replaceable>[belgarath.lfs.org]</replaceable></command></userinput></screen>
|
---|
[6856556] | 133 |
|
---|
| 134 | <para>
|
---|
| 135 | Exit the <command>kadmin</command> program (use <command>quit</command>
|
---|
| 136 | or <command>exit</command>) and return back to the shell prompt. Start
|
---|
| 137 | the <acronym>KDC</acronym> daemon manually, just to test out the
|
---|
| 138 | installation:
|
---|
| 139 | </para>
|
---|
| 140 |
|
---|
[22c4e1ee] | 141 | <screen><userinput><command>/usr/sbin/kdc &</command></userinput></screen>
|
---|
[6856556] | 142 |
|
---|
| 143 | <para>
|
---|
[3be9cf07] | 144 | Attempt to get a <acronym>TGT</acronym> (ticket granting ticket) with the
|
---|
| 145 | following command:
|
---|
[6856556] | 146 | </para>
|
---|
| 147 |
|
---|
[619dd53] | 148 | <screen><userinput><command>kinit <replaceable>[loginname]</replaceable></command></userinput></screen>
|
---|
[6856556] | 149 |
|
---|
| 150 | <para>
|
---|
| 151 | You will be prompted for the password you created. After you get your
|
---|
[3be9cf07] | 152 | ticket, you should list it with the following command:
|
---|
[6856556] | 153 | </para>
|
---|
| 154 |
|
---|
| 155 | <screen><userinput><command>klist</command></userinput></screen>
|
---|
| 156 |
|
---|
| 157 | <para>
|
---|
| 158 | Information about the ticket should be displayed on the screen.
|
---|
| 159 | </para>
|
---|
| 160 |
|
---|
| 161 | <para>
|
---|
| 162 | To test the functionality of the keytab file, issue the following
|
---|
| 163 | command:
|
---|
| 164 | </para>
|
---|
| 165 |
|
---|
| 166 | <screen><userinput><command>ktutil list</command></userinput></screen>
|
---|
| 167 |
|
---|
| 168 | <para>
|
---|
[3be9cf07] | 169 | This should dump a list of the host principals, along with the encryption
|
---|
| 170 | methods used to access the principals.
|
---|
[6856556] | 171 | </para>
|
---|
| 172 |
|
---|
| 173 | <para>
|
---|
| 174 | At this point, if everything has been successful so far, you can feel
|
---|
| 175 | fairly confident in the installation and configuration of the package.
|
---|
| 176 | </para>
|
---|
| 177 |
|
---|
[add4a24] | 178 | <para>Install the <filename>/etc/rc.d/init.d/heimdal</filename> init script
|
---|
[6856556] | 179 | included in the <xref linkend="intro-important-bootscripts"/>
|
---|
| 180 | package.</para>
|
---|
| 181 |
|
---|
| 182 | <screen><userinput><command>make install-heimdal</command></userinput></screen>
|
---|
[cc75bcec] | 183 |
|
---|
| 184 | </sect4>
|
---|
| 185 |
|
---|
| 186 | <sect4><title>Using Kerberized Client Programs</title>
|
---|
| 187 |
|
---|
| 188 | <para>
|
---|
| 189 | To use the kerberized client programs (<command>telnet</command>,
|
---|
| 190 | <command>ftp</command>, <command>rsh</command>,
|
---|
| 191 | <command>rxterm</command>, <command>rxtelnet</command>,
|
---|
| 192 | <command>rcp</command>, <command>xnlock</command>), you first must get
|
---|
[3be9cf07] | 193 | a <acronym>TGT</acronym>. Use the <command>kinit</command> program to
|
---|
[cc75bcec] | 194 | get the ticket. After you've acquired the ticket, you can use the
|
---|
| 195 | kerberized programs to connect to any kerberized server on the network.
|
---|
| 196 | You will not be prompted for authentication until your ticket expires
|
---|
| 197 | (default is one day), unless you specify a different user as a command
|
---|
| 198 | line argument to the program.
|
---|
| 199 | </para>
|
---|
| 200 |
|
---|
| 201 | <para>
|
---|
| 202 | The kerberized programs will connect to non kerberized daemons, warning
|
---|
| 203 | you that authentication is not encrypted. As mentioned earlier, only the
|
---|
| 204 | <command>ftp</command> program gives any trouble connecting to non
|
---|
| 205 | kerberized daemons.
|
---|
| 206 | </para>
|
---|
[6856556] | 207 |
|
---|
[fc3fc228] | 208 | <para>
|
---|
| 209 | For additional information consult <ulink
|
---|
| 210 | url="http://www.linuxfromscratch.org/hints/downloads/files/heimdal.txt">the
|
---|
| 211 | Heimdal hint</ulink> on which the above instructions are based.
|
---|
| 212 | </para>
|
---|
| 213 |
|
---|
[619dd53] | 214 | </sect4>
|
---|
| 215 |
|
---|
[6856556] | 216 | </sect3>
|
---|
| 217 |
|
---|
| 218 | </sect2>
|
---|