Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support of Kerberos authentication in ccm-fetch #54

Closed
StephaneGerardVUB opened this issue May 9, 2015 · 20 comments
Closed

Support of Kerberos authentication in ccm-fetch #54

StephaneGerardVUB opened this issue May 9, 2015 · 20 comments
Milestone

Comments

@StephaneGerardVUB
Copy link

LWP::UserAgent needs the plugin LWP::Authen::Negotiate in order to enable Kerberos authentication in case the profiles are in an Apache with mod_auth_kerb. This plugin is provided by the package perl-LWP-Authen-Negotiate. I suggest that this package is added in the "external" repositories, and it becomes a dependency of the ccm package.

@stdweird
Copy link
Member

@StephaneGerardVUB what else is needed to make this work? if it is only a matter of adding the package, it could make it in 15.4 imho (the rpm exists in el5 EPEL); if more is needed, it will be 15.6.
@ned21 @gombasg any feedback (i was under the impression that MS used ccm with krb5)

@jrha
Copy link
Member

jrha commented May 11, 2015

It would be good to know! We plan migrate to kerberised ccm this year.

@jrha jrha added this to the 15.4 milestone May 11, 2015
@stdweird
Copy link
Member

now that i remember, i think this is related to quattor/CAF#62 and the earlier discussion in quattor/aii#81

@StephaneGerardVUB
Copy link
Author

@stdweird You need something else for it to work : a valid kerberos ticket for root. root can always create a ticket using the keytab of the machine by doing "kinit -k -t /etc/krb5.keytab". So, what is missing is implementing ticket creation in ccm-fetch.

@jrha jrha modified the milestones: 15.6, 15.4 May 11, 2015
@jrha
Copy link
Member

jrha commented May 11, 2015

Ok, lets leave this for 15.6.

@stdweird
Copy link
Member

tickets should be obtainable from perl, there's Authen::Krb5 to help with that
@StephaneGerardVUB if you can live manually creating the tickets, maybe you can also add the dependency in the templates for now? I agree with @jrha that this can't be achieved for 15.4

@StephaneGerardVUB
Copy link
Author

@stdweird Sure we can survive without that. You can postpone it to 15.6.

@ned21
Copy link
Contributor

ned21 commented May 11, 2015

We don't use mod_auth_kerb but instead encrypt the profile such that only the intended recipient can decrypt it.

@jrha
Copy link
Member

jrha commented May 11, 2015

Did you patch ccm to do the decryption?

@ned21
Copy link
Contributor

ned21 commented May 11, 2015

We don't have any local patches, if that's what you are asking. I believe this code in CCM originated from us.

@stdweird
Copy link
Member

@ned21 any specific reason why you use that way of working instead of mod_auth_kerb?

@ned21
Copy link
Contributor

ned21 commented May 11, 2015

Yes, several. One of them was that this provides encryption and authorisation via the same trust infrastructure. mod_auth_kerb requires SSL to ensure the data is not transmitted in the clear, plus management of appropriate ACLs on all the profile servers (of which we have many). Might be a good presentation at the next workshop if you are interested?

@jrha
Copy link
Member

jrha commented May 11, 2015

Yes please. What is doing the encryption?

@stdweird
Copy link
Member

👍 on the presentation
but aside from managing the trusts, no real technical reason? i think some sites are looking at a single realm setup, managed with freeipa; so if there's a technical drawback, that would be very interesting to know.

@ned21
Copy link
Contributor

ned21 commented May 11, 2015

@jrha - a CGI script on the web server

@stdweird - depends on your definition of "technical". I don't think we considered mod_auth_kerb because it didn't (alone) meet the requirements we had, while kerberos encryption did.

@jrha jrha modified the milestones: 15.10, 15.8 Aug 12, 2015
@jrha
Copy link
Member

jrha commented Dec 7, 2015

Is this issue just a matter of documentation now?

@jrha jrha modified the milestones: 16.2, 15.12 Dec 7, 2015
@stdweird
Copy link
Member

stdweird commented Dec 7, 2015

@jrha no, not really, i plan to fix this via quattor/CAF#110. we need it end of january, so i'll work on it next month.

@stdweird
Copy link
Member

@ned21 @gombasg what are the odds of MS accepting dependency on LWP::Authen::Negotiate in CAF or CCM? it is in epel, but even for el7 not in main repos. i could reimplement the code ofcourse (it's not that hard), but i'd prefer to avoid this kind of duplication.

@jnovy
Copy link

jnovy commented Jan 25, 2016

Hi Stijn,

it's ok as we can use EPEL now. perl-LWP-Authen-Negotiate is in all EPELs (version 0.08) so we should be good if you use this one.

Cheers,
Jindrich

@stdweird
Copy link
Member

@jnovy thx!

@stdweird stdweird added this to the 16.4 milestone Feb 11, 2016
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

No branches or pull requests

5 participants