I am using openafs-1.8.6 on SL-6.10/Centos-6.10
I just rekeyed successfully.
The docs in OpenAFS lead to some rxkad.keytab for some Openafs-1.6.x
(around year 2013)
After creating such a file, one needs to apply 'akeyconvert' ; which
transfers the heart of it
to the file KeyFileExt which is used for newer openafs versions , e.g.
1.8x, for non-DES-Keys.
=== In short: ===
# cd /usr/afs/etc
## dont -keepold:
kadmin.local: cpw -e aes256-cts-hmac-sha1-96 -pw XXXXXXXXX afs/cellname
kadmin.local: ktadd -k rxkad.keytab -norandkey afs/cellname
# ls -la
total 36
drwxr-xr-x 2 root root 4096 Sep 16 16:47 .
drwxr-xr-x 6 root root 4096 Sep 11 16:12 ..
-rw-r--r-- 1 root root 60 Sep 11 16:31 CellServDB
-rw------- 1 root root 16 Sep 11 16:31 KeyFile
-rw------- 1 root root 4 Sep 11 16:31 KeyFileExt
-rw-r--r-- 1 root root 11 Sep 11 16:30 ThisCell
-rw-r--r-- 1 root root 6 Sep 11 16:31 UserList
-rw-r--r-- 1 root root 23 Sep 11 17:35 krb.conf
-rw------- 1 root root 88 Sep 16 16:47 rxkad.keytab
cp -p KeyFile KeyFile.save
hexdump -C KeyFileExt
00000000 00 00 00 00 |....|
00000004
# /usr/afs/bin/akeyconvert
Wrote 1 keys
# ls -la
total 40
drwxr-xr-x 2 root root 4096 Sep 16 17:00 .
drwxr-xr-x 6 root root 4096 Sep 11 16:12 ..
-rw-r--r-- 1 root root 60 Sep 16 17:02 CellServDB
-rw------- 1 root root 16 Sep 16 17:02 KeyFile
-rw------- 1 root root 16 Sep 11 16:31 KeyFile.save
-rw------- 1 root root 56 Sep 16 17:02 KeyFileExt
##############################
-rw-r--r-- 1 root root 11 Sep 11 16:30 ThisCell
-rw-r--r-- 1 root root 6 Sep 11 16:31 UserList
-rw-r--r-- 1 root root 23 Sep 11 17:35 krb.conf
-rw------- 1 root root 88 Sep 16 16:47 rxkad.keytab
# umount /afs ; /usr/vice/etc/afsd -shutdown ; rmmod libafs
# killproc -y /bosserver
# --
# /usr/afs/bin/bosserver
# /root/startafsd
# kinit admin
# aklog -d -setpag
# touch /afs/.$cell/XXX ## if this works , all is done
# klist -fe
# you should not see anything with 'des' , only AES***
Now you should be done.
Jeffrey is right advising to rekey, see below.
My earlier mail about gssklog: it could circumvent an outage because of
newer KRB5 distros,
but also uses DES and does not help the security concerns with it.
My above notices might be helpful insofar the 'akeyconvert' as a needed
afterburner is set in place.
Best regards
Rainer
On 2020-09-15 19:33, Jeffrey E Altman wrote:
Hi Rainer,
The DES only limitatJeffreyion of the afs/cell@REALM service principal was
removed in the 2013 release of OpenAFS 1.4.15 and 1.6.5. Since those
releases neither the server ticket key nor the session key are
restricted to the des-cbc-crc encryption type. All cells should be
upgraded to current versions of OpenAFS on the servers and should rekey
the afs/cell@REALM service principal with the aes256-cts-hmac-sha1-96
encryption type.
This includes cells that have deployed gssklogd. If the KeyFile
contains a des-cbc-crc key, the cell is vulnerable to the Brute Force
Attacks described by
http://www.openafs.org/pages/security/OPENAFS-SA-2013-003.txt
Changing the service principal encryption type protects against this
brute force attack. However, it is important to note that even when an
aes256-cts-hmac-sha1-96 session key is negotiated, the OpenAFS client
and server will derive from that key a 56-bit key to use for the fcrypt
encryption type used by rxkad for wire security.
Jeffrey Altman
On 9/15/2020 12:32 PM, r. l. ([email protected]) wrote:
The simplest solution: use gssklog of D.E.Engert. The token then
comes from an AFS vlservers KeyFile
and not from an entry afs/**@*** in some krb5kdc. Just run some gssklogd
and switch from aklog to
gssklog in your profiles. Some times ago, even CERN.ch used it.
The original tarfile can still be found at
http://www.hep.man.ac.uk/u/masj/gssklog/
or try my updated version at
http://95.217.219.185/ContribAFS/Gssklog-0.11.tar
The binaries were done on ScientificLinux-6.10 with a newer KRB5 in
/opt/krb5/
and a static compilation of openafs (had to fix hcrypto and roken libs
there)
Best regards
R. Laatsch
=================================================================
On 2020-09-14 10:32, ProbaNet SRLS wrote:
Hello!
Recent releases of krb5 (> 1.18) no longer support single des
encryption (the "allow_weak_crypto = yes" option in krb5.conf client
side has no longer effect), so now we get this error with "aklog -d":
---
Kerberos error code returned by get_cred : -1765328370
aklog: Couldn't get XXXXX AFS tickets:
aklog: KDC has no support for encryption type while getting AFS tickets
---
How should we proceed?
Stefano
_______________________________________________
OpenAFS-info mailing list
[email protected]
https://lists.openafs.org/mailman/listinfo/openafs-info
_______________________________________________
OpenAFS-info mailing list
[email protected]
https://lists.openafs.org/mailman/listinfo/openafs-info
_______________________________________________
OpenAFS-info mailing list
[email protected]
https://lists.openafs.org/mailman/listinfo/openafs-info