I've had this little hack sitting around (and in use) for a while so
I thought I would post it to the net to get some feedback and see if
other people find it useful.

kftgt/kfttd will forward your Kerberos ticket granting ticket from 
one host to another, over an encrypted channel. You do NOT have to enter
your password as it extracts your current TGT from your ticket cache and
forwards that to the remote host. This only works if you are using the
AFS Kerberos server since it ignores IP address in TGTs.

The normal use would be something like:

kftgt slapshot         # forward your tgt
rlogin slapshot -x     # do an ecnrypted rlogin

Then the login program (or your .login script) can run aklog to get you 
an AFS token once you login. 

In order for all this to work you need the following:

1. You have to be running the AFS Kerberos server because it ignores
   IP address in TGTs. It wont' work under MIT's V4 unless you've hacked
   your V4 server.

2. You have to have kftgtd started from inetd on the host you are
   forwarding your ticket to.

3. The host you are forwarding you ticket to must be registered in the
   Kerberos database using the standard rcmd.hostname principal, and
   have a srvtab file (of course).

4. You need Kerberos libraries to build kftgt/kftgtd. 

Getting kftgt/kftgtd:

       ftp://jessica.stanford.edu:/pub/kftgt-1.0.tar.Z
       file:/afs/ir.stanford.edu/users/s/schemers/Public/kftgt-1.0.tar.Z

There is a README file and man pages (!) in the tar file. 

Roland

-- 
Roland J. Schemers III             |    Networking Systems 
Authentication Services Programmer |    414 Sweet Hall  +1 (415) 723-6740 
Distributed Computing Operations   |    Stanford, CA 94305-3090
Stanford University                |    [EMAIL PROTECTED] 

Reply via email to