> On 4 Jan 2015, at 5:32 pm, Brian Empson <br...@teamhandbanana.com> wrote: > > This sounds interesting. What would you replace krb5 with, if you don't mind > me asking? I was contemplating krb5, but the setup and such is a pain for me > (because I am not familiar with it). I'll probably wind up rolling something > custom with LDAP and YP mappings thrown in.
i dunno. ideally i would just do basic auth over https against something that just returns 200 or 403. bsdauth on openbsd means i could probably implement that with a crappy script. linux probably has a crazy pam module i could use to do auth with http, but the solarish things i run almost certainly dont. however, linux and solaris still support krb5 auth out of the box, so its only a problem i really have to solve on openbsd. or use ldap auth. > > On 1/4/2015 2:26 AM, David Gwynne wrote: >>> On 2 Jan 2015, at 9:52 pm, Brian Empson <br...@teamhandbanana.com> wrote: >>> >>> I'm looking into a way to sync up group and user information across a >>> network of OpenBSD machines. I like YP, except that I don't need the >>> password hashes transferred across the network. I like that it's built >>> right into the base install, are there better ways to handle synchronizing >>> login details across multiple machines that is built into the base install? >>> Preferably written by the OpenBSD team, too? >> while not directly answering your question, i can say openbsd can do this >> kind of stuff without yp on the wire. >> >> at work i use ypldap to get user/group information from active directory. we >> populate the rfc2307 attributes on our users and groups to make them useful >> on unix systems. we use the single directory as a name service backend for >> openbsd, solaris, linux, and windows (of course). >> >> we're still using krb5 for password authentication. i really have to fix >> that. >> >> we've also augmented the AD schema to store users ssh keys in the directory >> too. sshd gets access to them via AuthorizedKeysCommand and a perl script. >> this allows ssh key based single sign on across all our unixish systems, >> even if their home directories are not available on the system. this is >> useful for providing services over ssh. an example of such a service we >> provide is svn and git on a dedicated server. all our users are on the >> system via ypldap, and they can auth using their own username and either a >> password or ssh key. >> >> dlg