On Nov 1, 2006, at 17:38, Edward Murrell wrote:
> I'd like to know if anyone has any practical experience in migrating a
> Kerberos realm.
>
> Back in the day, when I was learning about Kerberos, I set up the  
> local
> realm with the name 'OFFICE'. Since we had a local domain of the same
> name, this was fine, and I propergated information via DNS and
> everything was happy.
>
> Since then, we've expanded somewhat, and we now have a bunch of off- 
> site
> servers. Currently, I've got a bunch of servers in the US, and some in
> NZ, as well as our local office servers, and workstations. It turns  
> out
> that it is possible to make this work, but it requires bigger config
> file than, and updating the files every time something changes.
>
> [libdefaults]
>         default_realm = OFFICE
>
>
> The plan is to move the whole shebang to a COMANY.COM realm. However,
> I'd like to do this while causing as little downtime and disruption as
> possible. I had originally planned to run two realms in parallel and
> tell them to trust each other. Unfortunately,  MIT Kerberos doesn't
> appear to allow you to run two KDC's on the same server.

You can, but you have to write the config files to specify different  
port numbers for them.  (The code doesn't currently support using  
only some of a machine's IP addresses, if you wanted to put one on  
one address and one on another.)  The code theoretically supports  
serving multiple realms out of one KDC process, too, but we don't  
test that functionality often.  I'd be interested in any observations  
if you try it.

You may also be able to convert entries from one realm into entries  
in the other realm.  It'll take a bit of programming work, because  
our tools don't directly support it, but basically, you'd start with  
copying database records over.  That would include the raw keys  
(encrypted in the database master key, which would have to be kept  
the same while this is done), but not the passwords.  In programs  
like kinit, the keys are constructed from the password and a "salt"  
string, which by default is in turn constructed from the principal  
name, including the realm name.  But the database can store a special  
salt string for a principal's key, so you'd modify some (most?)  
entries for users to have the salt string computed based on the old  
realm name.

You'd still have to distribute new keytabs, update config files,  
etc., for the transition, but it may keep you from needing to reset  
everyone's passwords, rekey machines, etc.

Ken
________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to