On 14 Jan 2008, at 16:17, Jeff Blaine wrote:
> How are people approaching the creation of host/host.foo.com
> without human intervention?

There have been a couple of talks on this subject at recent AFS &  
Kerberos Best Practices Workshops:
http://workshop.openafs.org/afsbpw05/talks/kerb-auto.html (slides at  
http://www.dice.inf.ed.ac.uk/publications/AFSWorkshop-2005/ 
AFSWorkshop.pdf )
and
http://workshop.openafs.org/afsbpw07/talks/bbense.pdf

The first link describes what we do here in Informatics @ Edinburgh  
University. We have a complex machine configuration system which  
installs, and customises, the operating system. At the end of that  
installation process, the machine prompts the user for a set of  
administrative credentials, and then uses those to create a principal  
for 'hostclient/machine.inf.ed.ac.uk'. The machine's configuration  
system then uses this hostclient principal to fetch key material for  
all service principals that the machine should have. Permissions over  
which principals to fetch are controlled by our central configuration  
database, which maintains a record of which services a machine runs,  
and therefore which principals a machine may be allowed. In addition,  
a hostclient/<machine> principal may only fetch keys for */<machine>  
principals.

This obviously requires attended installation - part of our  
installation procedure is that a member of staff goes to each machine  
once installation is complete, and checks its console, so this isn't  
a huge burden for us.

We did design, but never deployed, an alternative system which used  
the MAC address of the machine to control access to the initial key  
material. In this scheme, an administrator would tell a central  
daemon which machines were about to be installed - this would fetch  
the configuration details of these machines from a central database.  
As each machine completed installation, it would send a request to  
the daemon for key material for the hostclient principal. Only one  
request per machine would be permitted - multiple requests would be  
reported as security violations, and requests would have to come from  
the correct MAC address. This is obviously less secure than our  
current solution, but has the advantage that it allows unattended  
installation of large numbers of machines.

Hope that helps,

Simon.

________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to