Quoting Andrew Deason <[email protected]>:

On Wed, 15 Dec 2010 10:35:19 -0500
[email protected] wrote:

You used to be able to do straight krb5 auth in samba like 3.0.12 or
so was the first version to support it and if you want me to look
-somewhere- I have a link for the "how-to".  Then you could probably
do the preexec to get the token. I never actually thought about that
part. The krb5 piece worked. I tested that a long while ago like
3.0.24ish.

Samba can do krb5 auth, but you would need the client to forward
tickets, too, in order to get tokens. I find it less likely that Samba
can do that, but I do not really know; maybe it can.

This isnt the how-to I found but from the list..

With MIT Kerberos, you need to put the following settings in
smb.conf:

   realm = KERBEROS.REALM.NAME
   security = ads
   encrypt passwords = yes
   use kerberos keytab = yes

and to add the appropriate service principals in /etc/krb5.keytab.  Which
service principals are appropriate is something of a black art, because
Windows clients think that principal names are case-insensitive.  You will
probably need to add

   serv...@realm
   host/server.example.com at REALM
   cifs/server.example.com at REALM

plus some case variations such as

   HOST/server.example.com at REALM
   host/SERVER.example.com at REALM

You can easily see which service principal a Windows client is requesting
by using Ethereal to capture the traffic between the Windows client and
the KDC.

You'll need at least Samba 3.0.11 to avoid a segfault when the client
connects.  Current SVN has a patch that makes Samba accept any case
combination in the Kerberos principal name; previously it would accept
only a few variations.



_______________________________________________
OpenAFS-info mailing list
[email protected]
https://lists.openafs.org/mailman/listinfo/openafs-info

Reply via email to