-
Notifications
You must be signed in to change notification settings - Fork 13
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support of Kerberos authentication in ccm-fetch #54
Comments
@StephaneGerardVUB what else is needed to make this work? if it is only a matter of adding the package, it could make it in 15.4 imho (the rpm exists in el5 EPEL); if more is needed, it will be 15.6. |
It would be good to know! We plan migrate to kerberised ccm this year. |
now that i remember, i think this is related to quattor/CAF#62 and the earlier discussion in quattor/aii#81 |
@stdweird You need something else for it to work : a valid kerberos ticket for root. root can always create a ticket using the keytab of the machine by doing "kinit -k -t /etc/krb5.keytab". So, what is missing is implementing ticket creation in ccm-fetch. |
Ok, lets leave this for 15.6. |
tickets should be obtainable from perl, there's |
@stdweird Sure we can survive without that. You can postpone it to 15.6. |
We don't use mod_auth_kerb but instead encrypt the profile such that only the intended recipient can decrypt it. |
Did you patch ccm to do the decryption? |
We don't have any local patches, if that's what you are asking. I believe this code in CCM originated from us. |
@ned21 any specific reason why you use that way of working instead of |
Yes, several. One of them was that this provides encryption and authorisation via the same trust infrastructure. mod_auth_kerb requires SSL to ensure the data is not transmitted in the clear, plus management of appropriate ACLs on all the profile servers (of which we have many). Might be a good presentation at the next workshop if you are interested? |
Yes please. What is doing the encryption? |
👍 on the presentation |
Is this issue just a matter of documentation now? |
@jrha no, not really, i plan to fix this via quattor/CAF#110. we need it end of january, so i'll work on it next month. |
Hi Stijn, it's ok as we can use EPEL now. perl-LWP-Authen-Negotiate is in all EPELs (version 0.08) so we should be good if you use this one. Cheers, |
@jnovy thx! |
LWP::UserAgent needs the plugin LWP::Authen::Negotiate in order to enable Kerberos authentication in case the profiles are in an Apache with mod_auth_kerb. This plugin is provided by the package perl-LWP-Authen-Negotiate. I suggest that this package is added in the "external" repositories, and it becomes a dependency of the ccm package.
The text was updated successfully, but these errors were encountered: