ldap_servers= and failover

2017-06-29 Thread Kevin Longfellow
Hi, This is for MIT Kerberos with the KDC's using a ldap back end. From the documentation, it states that a whitespace-separated list of ldap servers can be specified for ldap_servers=.  I'm assuming that is some type of failover list?  We have a F5 LTM setup with a single load balance dns name

MIT Kerberos version 1.6 with F5 BigIP

2010-02-18 Thread Kevin Longfellow
Hi, Just wondering if anyone can tell me if it's possible or reasonable to put multiple kdc's behind a F5 BigIP for load balance purposes? We have tried a simple configuration with port 88 UDP but it seems to causes some issues with the kdc's. Getting a TGT with kinit seems to work just fine

krb5kdc: Invalid message type - while dispatching (udp)

2010-02-22 Thread Kevin Longfellow
Hi, We are testing using a F5 BigIP load balancer for the kdc's. Setting the F5 for port 88 UDP works but the F5 probe produces the below kdc issue in the log file. The response from F5 is to "paste a proper Kerberos UDP payload into the health monitor". I think if F5 knew what that was the

ldap_conns_per_server = 5

2010-03-08 Thread Kevin Longfellow
Hi, Going through krb5.conf for a kdc that will be using ldap as the back end, the variable ldap_conns_per_server = 5 seems low. Consider a kdc for 30k+ users will this setting be ok? What does this variable really limit? Having no practical experience with a large deployment using ldap as

max ticket/renew appears to not work in 1.7.1?

2010-03-15 Thread Kevin Longfellow
Hi, We are working on setting up a very large Kerberos environment and recently changed to 1.7.1 with a ldap back end for our testing. Since two things changed from our previous test environment, I'm not sure what might be the cause of user tickets not getting the requested max lifetime and m

Fw: Kerberos Digest, Vol 87, Issue 10

2010-03-15 Thread Kevin Longfellow
"Re: Contents of Kerberos digest..." > > > Today's Topics: > >    1. max ticket/renew appears to not work > in 1.7.1? (Kevin Longfellow) > > > ------ > > Message: 1 > Date: Mon,

1.7.1 krb5kdc crash on Enterprise Linux version 5 u4 x86_64

2010-03-26 Thread Kevin Longfellow
Hi, We are testing a Kerberos version 1.7.1 environment on EL5u4 and the KDC crashed with the below in /var/log/messages: Mar 25 20:26:16 dadvil0122 kernel: krb5kdc[4124]: segfault at rip 003eeea7bcb4 rsp 7fffe1f90c58 error 4 1.7.1 was built from source with ldap and

clear text password used

2010-06-10 Thread Kevin Longfellow
Hi, After reading the Aims section at http://www.kerberos.org/software/tutorial.html, it states the users password must never travel over the network. Take for example using LDAP as the back end for the principals. For a security review, I need to understand the path of the clear text passw

krb5.conf domain_realm question

2010-07-01 Thread Kevin Longfellow
I quickly looked at the manual and did not see a wildcard option so sorry if it's in the manual. I'll continue to look. Instead of [domain_realm] .foo.com = DEV.FOO.COM foo.com = DEV.FOO.COM .foo2.com = DEV.FOO.COM foo2.com = DEV.FOO.COM Can I simply put a wildcard there and map all domai

list principals using ldap back end

2010-09-30 Thread Kevin Longfellow
Hi, I tried to find this in the documentation so if someone could point me in the right direction, I would appreciate it. I am trying to list all the kerberos principals created with a LDAP back end that are not in the realm container. Using kadmin list_principals only shows what is in the r

LDAP handle unavailable: Can't contact LDAP server

2010-12-22 Thread Kevin Longfellow
Hi, Three KDC's are running MIT Kerberos 1.7.1 on RHEL 5u4 x86_64 We use ldap as the back end for all Kerberos principals. This morning all the KDC's (three of them) appear to have lost connection to the ldap server resulting in a complete loss of service. At first I thought it was a SSL ce

krb5kdc log analysis tool/script

2011-01-07 Thread Kevin Longfellow
Hi, We are using MIT Kerberos 1.7.1 on a linux server and have a lot of kdc log entries (100k+ in a 9 hour span) in the kdc logfile krb5kdc.log. I figured it can't hurt to ask but does anyone have or know of a tool/script to parse the log and summarize the activity? Any help is appreciated!

kvno of kinit not matching kvno of nfs principal and keytab using LDAP back end

2012-04-13 Thread Kevin Longfellow
Hi, Configuration: The KDC's running MIT Kerberos 1.7.2 (with patches) LDAP back end Running on RedHat Linux EL 5.4 I'm curious if there is a known issue that might be fixed with a patch or particular release where the kvno from kinit is 2 but the kvno of the nfs principal and what's in the

kdc_rotate/good method to rotate kdc and admin_server logs

2012-08-21 Thread Kevin Longfellow
Hi, Forgive me for being dense but when does log rotation happen using kdc_rotate if period = 1d?  I have tried using logrotate but it loses some data and now am trying kdc_rotate and admin_server_rotate in krb5.conf.  This is MIT Kerberos version 1.7.2.  Ideally I'd like the logs to always r

Re: kdc_rotate/good method to rotate kdc and admin_server logs

2012-08-28 Thread Kevin Longfellow
From: Benjamin Kaduk To: Kevin Longfellow Cc: "kerberos@mit.edu" Sent: Thursday, August 23, 2012 10:26 AM Subject: Re: kdc_rotate/good method to rotate kdc and admin_server logs On Tue, 21 Aug 2012, Kevin Longfellow wrote: > > >

Two realms and access to Kerberized NFS areas?

2012-09-06 Thread Kevin Longfellow
Hi, Any advice on possible/best solutions for the below scenario? Two Kerberos REALM's: REALM1.COM REALM2.COM Assume they are separate realms with no cross-realm authentication. user logs in and runs kinit kbpr...@realm1.com user accesses KerberizedNFS home areas in REALM1.COM user now need