The Kerberos authentication scheme in Windows and Linux uses tickets, which can be used to prove that a process is acting on behalf of a user. A user gets a ticket by requesting one and providing their password. Until that ticket expires, processes that support Kerberos can be run with the permissions of that user.
So let's say we want to access a Windows share as user "testa", which is a Windows user known to the AD server. The Linux machine asks for a ticket for testa, using testa's password. The AD server validates the password and gives the Linux machine a ticket. The Linux machine can then mount the Windows share using Kerberos authentication. Accesses to the files and directories on the share will then be allowed or denied based on testa's permissions.
I built an AD server on Windows 2003 Server SP2. The client machine was Ubuntu Desktop Edition 9.04.
Here's how I went about it:
- Build an Active Directory server accepting the defaults. This included allowing it to set up its own DNS server. I already have DNS servers in my network, but I'm not a DNS expert. I've had bad luck changing my DNS setup in the past, so for this test I just let AD do its thing.
- Install required packages on the Linux machine:
- Replace the installed /etc/krb5.conf with the following. You have to replace "my.domain.tld" with your own domain, of course. Be careful to copy uppercase and lowercase:
- Add the following line to /etc/request-key.conf. The order of the lines is important. I put it last and nothing changed. I put it first and everything worked:
- Get a key with kinit. Run kinit with sudo. The ticket you get is for the AD user testa whether you run as sudo or not, but the place that kinit stores the ticket depends on the Linux user who runs kinit. Since the mount command runs as root, you have to get a ticket for root or mount won't find the ticket
- Mount the share, replacing "FileServer", "Share", and "/tmp/mnt" with appropriate values for your systems:
sudo apt-get install krb5-user keyutils
[libdefaults]
default_realm = MY.DOMAIN.TLD
default_checksum = rsa-md5
[realms]
MY.DOMAIN.TLD = {
kdc = ADServer.my.domain.tld
}
[domain_realm]
.my.domain.tld = MY.DOMAIN.TLD
my.domain.tld = MY.DOMAIN.TLD
create cifs.spnego * * /usr/sbin/cifs.upcall %k %d
sudo kinit -f testa
sudo mount -t cifs -o sec=krb5i //FileServer/Share /tmp/mnt
I've tested this up to and including the mount. I haven't finished testing the background process I originally wanted to build. I may modify this post based on my testing experience, so check back later.
2 comments:
Hi Larry,
I had the same problems using kerberos authentication like you. Fortunately I found a bug report on launchpad (https://bugs.launchpad.net/ubuntu/hardy/+source/samba/+bug/236830) which gave me a hint.
BUT: do you have any idea how to authenticate to shared windows 2003 printer (CUPS / smbspool) via kerberos? Ich not able to print to a shared windows printer from my linux box.
Many thanks!
Stefan
Stefan, thanks for your comment. Your link is a useful one, because many people will still be on 8.04 LTS, to which the bug applies.
I'm afraid the task I'm working on now doesn't require me to authenticate to a printer, so I don't know how to solve your problem. If I figure it out I'll post the solution, but it's not something I'm likely to do in the near future.
Post a Comment