Open main menu

Linux and Unix Users Group at Virginia Teck Wiki β

Changes

Authentication

2,251 bytes added, 20:30, 30 April 2013
Created page with "VTLUUG has been using Kerberos and LDAP for authentication since at least September 2012. Our realm is <code>VTLUUG.ORG</code> but may change in the future to something under ..."
VTLUUG has been using Kerberos and LDAP for authentication since at least September 2012. Our realm is <code>VTLUUG.ORG</code> but may change in the future to something under the vt.edu domain.

In April 2013, Kerberos authentication on acidburn was forced.
* If you haven't bothered to find an officer to Kerberize you in the past 6 months, you'll need to come to a meeting to set a new password.
* If your account got locked out and you have been Kerberized, email officers@vtluug.org to get it unlocked. We lock inactive accounts in order to reduce the likelihood of accounts with weak passwords getting compromised.

==MIT Kerberos Client Configuration==
For MIT Kerberos, put this in /etc/krb5.conf:

[libdefaults]
# default_realm = ATHENA.MIT.EDU
default_realm = ECE.VT.EDU

[realms]
# use "kdc = ..." if realm admins haven't put SRV records into DNS
ATHENA.MIT.EDU = {
admin_server = KERBEROS.MIT.EDU
default_domain = MIT.EDU
v4_instance_convert = {
mit = mit.edu
lithium = lithium.lcs.mit.edu
}
}
ANDREW.CMU.EDU = {
admin_server = vice28.fs.andrew.cmu.edu
}
ECE.VT.EDU = {
admin_server = auth.ece.vt.edu
default_domain = ece.vt.edu
kdc = auth.ece.vt.edu
}
VTLUUG.ORG = {
kdc = blade.vtluug.org
admin_server = blade.vtluug.org
}

[domain_realm]
ece.vt.edu = ECE.VT.EDU
.ece.vt.edu = ECE.VT.EDU
.mit.edu = ATHENA.MIT.EDU
mit.edu = ATHENA.MIT.EDU
.media.mit.edu = MEDIA-LAB.MIT.EDU
media.mit.edu = MEDIA-LAB.MIT.EDU
.ucsc.edu = CATS.UCSC.EDU
andrew.cmu.edu = ANDREW.CMU.EDU
.andrew.cmu.edu = ANDREW.CMU.EDU
.vtluug.org = VTLUUG.ORG
vtluug.org = VTLUUG.ORG
.luug.ece.vt.edu = VTLUUG.ORG
luug.ece.vt.edu = VTLUUG.ORG

[logging]
# kdc = CONSOLE

==SSH Authentication with Kerberos==
Put this in your ~/.ssh/config:
# Kerberos
Host *
GSSAPIAuthentication yes
GSSAPIDelegateCredentials yes
# GSSAPIStrictAcceptorCheck = no
ServerAliveInterval 60

Then you can just <code>kinit user@VTLUUG.ORG</code> and you should be able to <code>ssh user@acidburn.vtluug.org</code> without a password. You can also login to any machine on our cluster or most of the machines on wood. Note that IPv6 is currently required for getting Kerberos tickets.
Anonymous user