I'm a little confused about kimpersonate.  I realize it's
not OpenAFS code, but maybe someone can explain further:

     kimpersonate -s host/[email protected] \
                  -c [email protected] -5

     "will create a Kerberos 5 ticket for [email protected] for
      the host hummel.e.kth.se if there exists a keytab entry
      for it in /etc/krb5.keytab"

So:

a) Extract the key for afs/OUR.ORG into /etc/krb5.keytab
   once the host was fully secured

b) kimpersonate -s afs/OUR.ORG -c [email protected] -5

c) aklog

No?

Can't modern MIT kinit do the same thing?

On 12/30/2010 4:00 PM, Jeff Blaine wrote:
Thanks for all of the replies.

I would like to document the various methods as I am investigating
this.

 From Samba 3.5.6 configure:

--with-afs

Kerberos v4 auth via native AFS libs.

Requires cleartext SMB password.

Useful, albeit insecure, no less than 5+ years ago.

--with-fake-kaserver

What the heck is this? I know what fakeka is. I don't
know enough to make sense of the spots where I find
WITH_FAKE_KASERVER defined in the Samba source.

Is this support for authenticating only to a fakeka, which
as I understand it would gain you Kerberos v5 using crappy
old enctypes?

If so, that would mean it's useless for those not running
(or wanting to run) fakeka. We don't.

kimpersonate

Haven't even looked into it yet. Will, and will doc.
_______________________________________________
OpenAFS-info mailing list
[email protected]
https://lists.openafs.org/mailman/listinfo/openafs-info

_______________________________________________
OpenAFS-info mailing list
[email protected]
https://lists.openafs.org/mailman/listinfo/openafs-info

Reply via email to