Disclaimer: I'm new to trying gss-tsig as an update method, so it is
entirely possible I'm doing something completely stupid.

I'm using bind 9.7.3 (because it ships with RedHat 6), with an Active
Directory as the kerberos infrastructure.

If I use the following update-policy:

grant * subdomain my.dns.domain ANY;

then it works (both for nsupdate -g and with a windows client using
windows native methods); however this means anyone with a kerberos
ticket (including a user ticket!) can register anything they like into
the domain.

I've tried all sorts of tests with the ms-self, ms-subdomain,
krb5-self and krb5-subdomain nametypes, and they all seem to fail. I
suspect this is because  my.dns.domain is not the same as my kerberos
realm (and I can't make it the same, as I really can't go messing with
the zone which does match the realm). They all fail with REFUSED (not
BADKEY, the checking of credentials all seems to work fine).

The documentation for these nametypes does seem to be rather sparse,
so I'm not really sure what the syntax should be. What I was hoping
for is a way of having MACHINE$@KRB5.REALM able to update
machine.dns.domain, and preferably also
host/machine.krb5.realm@KRB5.REALM able to update machine.dns.domain,
although the latter isn't vital. (I'm assuming
host/machine.dns.domain@KRB5.REALM would work, but I'm not sure that
is actually useful, and certainly won't work for the windows clients).

Is this possible?

Cheers

David
_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to