On 06/06/00 15:43:45 -0500 "Douglas E. Engert" <[EMAIL PROTECTED]> wrote:
>> Unfortunately, it's not that simple. The DFS migration toolkit required
>> a number of special tools, including a translation server. The cache
>> manager knows nothing about krb5; it believes it is talking to a normal
>> AFS server using normal V4-based rxkad.
>>
>
> Yes I realize it is not that simple. What I was pointing out was that
> cache manager and the protocols appear not to need modifications, just
> the servers. And that Transarc as already done some of the work when they
> wrote the translator.
Except that the cache manager needs to know and be able to use the session
key in order to make an authenticated connection. That means you're
essentially restricted to using 56-bit DES keys in the way that rxkad
already does. You could do something, but it wouldn't be krb5.
There are no authentication-related changes in the cache manager to support
the DFS translator. All the work is done in dlog and in the translator
itself. As with klog, the cache manager is handed an encrypted blob to
hand to the remote end, a kvno, and a 56-bit DES session key.
You could build something that uses this fact to hand the cache manager a
V5 ticket, like dlog does, but the protocol wouldn't be V5-based, and you'd
still be restricted to rxkad's existing authentication mechanism using
56-bit DES and fcrypt for data stream encryption. That means it wouldn't
work with V5 tickets that didn't happen to include a DES-CBC-CRC key.
You also wouldn't be able to have cells with a mixture of new and old
fileservers -- you can't use the new clients at all until all of your
fileservers have been migrated.
At that point, you may as well run krb524d on your KDC or AFS database
servers, and use krb524init and the V4 aklog (in fact, I believe someone
has released a V5-aware aklog that rolls the krb524 operation into the same
binary. You still have to be running a krb524 service, of course, since
one needs the service key in order to do the translation). This is a
solution that will work _today_ for people who want to use a DCE or Win2K
KDC with their AFS cell.
> One of the questions is: Should AFS be treated as a service, in a realm,
> running under principals such as: afs/<afscell>@<k5-relam>
>
> This could allow multiple AFS cells to be served by a single realm, or
> even multiple realms could issue tickets for the same cell.
There is precedent for this -- there are several cells at MIT which all use
the ATHENA.MIT.EDU realm, using service keys named
afs.<cellname>@ATHENA.MIT.EDU.
I think the correct behaviour is pretty obvious -- first try
afs/cellname@REALM, and then just afs@REALM; in both cases, REALM is the
realm containing the cell according to domain_realm mappings. (the current
MIT aklog actually uses the realm containing the cell's database servers; a
subtle but potentially important distinction). The resulting ticket can be
used as-is with mythical V5-aware rxkad, or handed to the krb524 translator
to get a V4 ticket that can be used with the currentlty-available AFS
software.
> I would like to see Transarc go forward with this project, which would
> allow one to use what ever Kerberos KDCs they wish with AFS servers.
Yeah, so would I. But I sincerely doubt that there is anyone left there
with both the understanding and motivation needed to do it right. As far
as I know, all of those people have left (no offense intended if some such
people are still at Transarc -- I just don't know of any).
-- Jeff