This week about 100 host and other service principals were deleted by mistake, 
rendering the owning systems and services unusable.

In order to remedy this, we tried using a pre-mistake backup (dump format) of 
the kdb to restore the principals:

    kdb5_util load -update dumpfile principal 

However this did not work. This is what’s documented in the MIT docs.  We were 
expecting to be able to run this once per missing principal.

So instead we loaded the backup dump into a temporary kdb and extracted the 
missing principals into a separate dump file:

    kdb5_util -d tempKDB load dumpfile
    kdb5_util -d tempKDB dump missing-princs-dumpfile princ1 princ2 … princN

 and ran this:

    kdb5_util load -update missing-princs-dumpfile

which worked. Systems restored; drinks all ‘round.

Questions:

Is there any easier way to do this?

When when loaded the missing principals, we shut down kadmind. Was this 
necessary? Or will kdb5_util lock the KDB properly when loading? We were 
worried about potential corruption if the KDB was not in a quiescent state.

When the missing principals were being added, the load process also reported 
that it added polices.  Why did it do that? If the policies are already there, 
is this a no-op?

We’re using MIT Kerberos 1.13.2, by the way.

jd

Attachment: smime.p7s
Description: S/MIME cryptographic signature

________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to