Christopher Allen Wing wrote:

As Douglas suggests, adding the principal to your realm:

afs/[EMAIL PROTECTED]

would also likely solve your problem. pam_krb5 only tries the instanceless
principal:

        [EMAIL PROTECTED]

when it can reverse map the IP address of the AFS server, and use that
domain name to come up with a Kerberos realm, using the [domain_realm]
section in /etc/krb5.conf.

(which is not my preferred behavior)


Hi Chris,
        Will this break my existing and working RHEL 3.4 systems?

        I'm trying to follow along with the Krb5 migration kit so that
I understand how all of this works.  My understanding is that your
"afs" principal has to have a matching kvno as in your AFS Keyfile.
If I change the format of the name from [EMAIL PROTECTED] to
afs/[EMAIL PROTECTED], I believe I would also have
to add this new key into the AFS Keyfile (extract with ktadd,
add to AFS Keyfile with asetkey).  However, unless the older
version of pam_krb5 used in RHEL 3.4 also uses the updated
name format, I believe I may "break" my working 3.4 machines.
Or, am I allowed to have both entries in the AFS Keyfile and
Krb database?

        As a side note, I have verified that both forward and reverse
name mapping work for my primary and secondary KDC and AFS servers.

Thanks,

-Dj

--
Dj Merrill
Sportsman 2+2 Builder #7118

"TSA: Totally Screwing Aviation"
_______________________________________________
OpenAFS-info mailing list
[email protected]
https://lists.openafs.org/mailman/listinfo/openafs-info

Reply via email to