On 07/12/2016 08:58, freeIPA users list wrote:
On ke, 07 joulu 2016, List dedicated to discussions about use,
configuration and deployment of the IPA server. wrote:
Or if you think there's a chance you might want to add another
Kerberized environment later (e.g. "ad.lautus.net")
I know the Quick Start Guide and Deployment Recommendations cover
depth, but there are still some ambiguities.
I'm trying to figure out if a company like us, lautus.net should use
subdomain like ipa.lautus.net for the IPA domain, or not.
It is really depending on your deployment details.
If you already have some other Kerberized environment in place and you
are not going to replace it by FreeIPA, then you need to make sure that
new FreeIPA deployment would not conflict with the existing one.
The question of whether you host ipa.lautus.net DNS (or indeed
lautus.net DNS) in FreeIPA is a different issue.
should continue to be hosted by DNS servers elsewhere that delegate say,
ipa.lautus.net to FreeIPA.
If you're happy with your existing DNS infrastructure, then you can
either delegate ipa.lautus.net to your FreeIPA servers (with NS
records); or run FreeIPA without DNS, and simply import the
ipa.lautus.net SRV records directly into the lautus.net domain.
Having FreeIPA host the ipa.lautus.net domain means these SRV records
are populated automatically, but it's not really that hard to add them
to an existing DNS service.
OTOH, if you *don't* already have a good authoritative internal DNS
service with a UI that you like, then you might want to use FreeIPA for
this anyway. You can easily create extra zones in FreeIPA.
I would be a bit wary about putting FreeIPA servers out on the public
Internet though. For one thing, the default config is an open resolver
(which you can tighten easily enough). I also have a deep distrust of
Java, but maybe that's just me.
The Kerberos realm always has a corresponding DNS domain, so realm
IPA.LAUTUS.NET has a corresponding DNS domain "ipa.lautus.net".
But on the other hand the same doc is full of examples where a Kerberos
realm like EXAMPLE.COM (instead of IPA.EXAMPLE.COM) is used, i.e example
2.2. of secion 2.3.4. But the same guide also says that the Kerberos
should be the same as the ipa DNS domain, just uppercased. So example
implies that example.com is running their DNS domain on FreeIPA, for
everything, not just for IPA SRV and TXT entries.
But with FreeIPA you can still manage hosts called foo.lautus.net or
bar.int.lautus.net. At worst you'd have some extra [domain_realm]
mappings in krb5.conf
(Aside: Active Directory is much more fussy, and basically doesn't work
if the hosts don't have hostnames within the same DNS domain as their
kerberos realm - and indeed have reverse DNS as well as forward)
And when ipa-client-install is run on somehost.lautus.net, it also
to LAUTUS.NET for Kerberos domain, as if the default expectation is that
your toplevel company DNS name would be your kerberos domain.
But you can override that.
And when I install a trial IPA server on host ipa-server-1.lautus.net
"ipa-server-install --setup-dns --realm IPA.LAUTUS.NET --domain
ipa.lautus.net --forwarder=188.8.131.52", and then look at the DNS Zones
Web UI, I see not only ipa.lautus.net, but also lautus, with record
ipa-server-1.lautus.net". In other words the IPA server defaults to
thinking it owns the domain above ipa.lautus.net too. Which goes against
Interesting. What does "ipa dnszone-find --pkey-only" show?
It seems like it's created an authoritative zone both for the server's
own domain (lautus.net if the server is xxx.lautus.net) as well as the
realm's domain (ipa.lautus.net)
I don't know why it's doing that. Now I've checked with another system
here: the hostname is "ipa-1.int.example.com" and the realm is
"ipa.example.com", and you're right, it is authoritative for both:
Zone name: int.example.com.
Zone name: ipa.example.com.
This isn't what I wanted. The int.example.com domain is hosted
externally and I didn't want to override it. Right now it's hiding all
names in int.example.com that it doesn't know about.
I would expect that it's possible to remove this zone, but I'd need to
test that doesn't stop other hosts called xxx.int.example.com from joining.
Aside: technically that's not a glue record. A glue record is an A or
AAAA record when the NS record points to a host within the subdomain
which is being delegated. It is to solve the chicken-and-egg situation
of how to contact a nameserver for a domain before you've contacted a
nameserver for the domain.
Yes and no. What you see with "@ NS ..." is a glue record -- you are
supposed to have a glue record for IPA domain in the upstream domain,
this is how domain delegation works in DNS world.
In your case, if you already have working DNS for lautus.net, then you
don't want FreeIPA to be authoritative for lautus.net as well.
Manage your subscription for the Freeipa-users mailing list:
Go to http://freeipa.org for more info on the project