HP UX Kerberos Data Security Software manual Troubleshooting Scenarios

Page 297

 

 

 

Troubleshooting

 

 

 

Troubleshooting Kerberos

Table 11-2

Troubleshooting Scenarios (Continued)

 

 

 

 

 

 

Clock skew too great in

This problem generally

You must run NTP or

 

KDC reply while getting

occurs because the clock

a similar service to

 

initial credentials.

of the system deviates

keep your system

 

 

too much from the time

clock synchronize

 

 

on the authenticating

with the atomic clock

 

 

KDC. A clock skew time

of the world. If you do

 

 

of up to 5 minutes is

not know how to do

 

 

allowed.

this, contact your

 

 

 

system administrator

 

 

 

to resolve this

 

 

 

problem.

 

 

 

 

 

Requesting host

The host uses the

 

 

principal without fully

/etc/hosts file to

 

 

qualified domain name.

resolve name lookups

 

 

Server not found in the

before using DNS. This

 

 

problem occurs when the

 

 

Kerberos database while

 

 

entry for the host in the

 

 

getting the credentials

 

 

/etc/hosts file contains

 

 

from KDC.

 

 

unqualified domain

 

 

 

 

 

Incorrect network

name before the fully

 

 

address while getting

qualified domain name.

 

 

credentials from KDC.

This problem can also

 

 

 

 

 

 

occur if the /etc/hosts

 

 

 

file has a different IP

 

 

 

address for a host from

 

 

 

what the DNS server

 

 

 

has.

 

 

 

 

 

 

The

The krb.conf file has

Copy the sample file,

 

/opt/krb5/krb.conf

not been created.

krb.conf.sample,

 

file not found.

 

from

 

 

 

/opt/krb5/example

 

 

 

and edit accordingly.

 

 

 

 

 

Cannot open or find the

This problem occurs

Copy the sample file,

 

configuration file while

when you try to create

krb.conf.sample,

 

initializing the Kerberos

the database and the

from

 

code.

krb.conf file is not

/opt/krb5/example

 

 

found in the /opt/krb5

and edit accordingly.

 

 

directory.

 

 

 

 

 

 

 

 

 

Chapter 11

297

Image 297
Contents Manufacturing Part Number T1417-90009 E0905 EditionCopyright Notices Legal NoticesPage Page Contents Configuring the Kerberos Server with Ldap Administering the Kerberos Server Contents Contents Propagating the Kerberos Server Managing Multiple Realms Contents Tables Table A-2. Configuration Worksheet Explanation Figures Figures Intended Audience What Is in This DocumentGlossary Interoperability with Windows 2000, onIndex Typographic ConventionsBold fixed WidthHP-UX Release Name and Release Identifier Publishing HistoryRelated Software Products Accessing the World Wide Web Related DocumentationRelated Request for Comments RFCs HP Encourages Your Comments Overview Overview Introduction How the Kerberos Server Works Authentication Process Illustrates the actions of the components and the Kerberos Authentication ProcessStep Authentication Process DES Versus 3DES Key Type Settings Ldap Advantages Introduction to LdapIntegrating Kerberos Server v3.1 with Ldap Integrating a Kerberos Principal in to the Ldap Directory Installing the Kerberos Server Installing the Kerberos Server Prerequisites Hardware Requirements System RequirementsSoftware Requirements Version CompatibilityInstalling the Server Installing the Server Chapter Migrating to a Newer Version Migrating to a Newer Version of the Kerberos Server Migrating from Kerberos Server Version 1.0 to Copy the dump file to the new system where you are installing Upon success, the following message appears Migrating from Kerberos Server Version 1.0 to Version Migrating from Kerberos Server Version 2.0 toCopy the dump file to the system on which you are installing Migrating from Kerberos Server Version 3.0 to Version Migrating to a Newer Version of the Kerberos Server Interoperability with Windows Interoperability with Windows Understanding the Terminology Table of Analogous Terms Kerberos Server Windows Scenario Kerberos Server and Windows 2000 InteroperabilityEstablishing Trust Between Kerberos Server and Windows Fqdn qualifier specifies the fully qualified domain name Single Realm Domain Authentication Interrealm Interdomain Authentication Database Considerations Special Considerations for InteroperabilityEncryption Considerations Postdated TicketsSpecial Considerations for Interoperability Chapter Special Considerations for Interoperability Chapter Configuring the Kerberos Configuration Files for the Kerberos Server Security Server Files That Require ConfigurationConfiguration File Function Krb.conf File Format Krb.conf FileKrb.realms File Krb.realms File Format Wildcard Character Description Wildcard CharactersAutoconfiguring the Kerberos Server To configure the server, select option Configuring the Kerberos Server with C-Tree Value, DES-MD5, is selected Server with Ldap Krb5ldap.conf File Configuration Files for Ldap IntegrationLdap Configuration Files File FunctionParameter Description Krb5ldap.conf File FormatThis line indicates a space Krb5schema.conf File Krb5schema.conf File Format Ticket’ Syntax Configuration Files for Ldap Integration Krb5map.conf File Format Krb5map.conf FileHpKrbAuthzData HpKrbKeyVersion HpKrbKeyData Before You Begin Planning Your Ldap ConfigurationSetting up Your Ldap Configuration For example, ou=people, o=bambi.com For example, ou=accounts, ou=people, o=bambi.com For example, uid. cn, homedirectory, gidnumber, uidnumber Autoconfiguring the Kerberos Server With Ldap Integration Configuring the Kerberos Server with LdapStep Select one of the following options Qualified host name or the IP address HpKrbKey Autoconfiguring the Kerberos Server With Ldap Integration Editing the Configuration Files Manually Configuring the Kerberos Server with LdapManually Configuring the Kerberos Server with Ldap Manually Configuring the Kerberos Server with Ldap Chapter Configuring the Primary Configuring the Primary Security Server Create the Principal Database After InstallationAdd an Administrative Principal To add an Administrative Principal Using the HP KerberosAdministrator To Add an Administrative Principal Through the Command Line Start the Kerberos Daemons Define Secondary Security Server Network Locations Password Policy File AdminaclfileSecurity Policies Starting the Security Server Configuring the Secondary Security Servers with C-Tree Creating the Principal DatabaseCopying the Kerberos Configuration File Creating a host/fqdn Principal and Extracting the Key Configuring the Secondary Security Servers with Ldap Creating a stash file using the kdbstash utility106 Using Indexes to Improve Database Performance 108 Administering the Kerberos 110 Administering the Kerberos Database Kadmind Command Configuration Files Required for kadmindFile Name Description Adminaclfile File Assigning Administrative Permissions Chapter 115 Adding Entries to adminaclfile Creating Administrative Accounts Using Restricted AdministratorHow the r/R Modifiers Work 118 Editing the Default File Password Policy FileDefault Password Policy Settings for the Base Group Password Policy Setting Default Value120 Principals 122 Adding User Principals Adding New Service PrincipalsReserved Service Principals Chapter 125 126 Removing User Principals Removing Special Privilege SettingsProtecting a Secret Key Removing Service PrincipalsChapter 129 Kadmin and kadminl Utilities Administration Utilities Name Description Administration UtilitiesHP Kerberos Administrator Function of OK, Apply, and Cancel Buttons Standard Functionality of the AdministratorCancel Button Name ActionUsing kadminlui Local Administrator kadminluiChapter 135 Principals Tab Principals Tab Components Principals TabSearch String Component Name Description List AllSearch List of PrincipalsGeneral Tab Principal Information Window Principal Information WindowPrincipal Information Window Components Field Name Description Password TabGeneral Tab Attributes TabField Name Description Principal Expiration General Tab ComponentsMaximum Ticket Lifetime Maximum Renew TimeField Name Description Password Policy Last ModifiedModified By Adding Principals to the Database Change Password Window Adding Multiple Principals with Similar Settings Creating an Administrative Principal Administering the Kerberos Server 148 Searching for a Principal Search CriteriaCharacter Description 150 Deleting a Principal Loading Default Values for a Principal Restoring Previously Saved Values for a Principal Changing Ticket Information Rules for Setting Maximum Ticket Lifetime Rules for Setting Maximum Renew Time Chapter 157 Changing Password Information Chapter 159 Password Tab Components Password Tab Principal InformationWindow Displays the Ldap DN that you are editingPassword Last Component Name Description PasswordChange Password Expiration/DateChange Password Window Password Tab Change Password Window Components Entering a passwordVerification Components Description New PasswordChanging a Key Type Changing a DES-CRC or DES-MD5 Principal Key TypeTo 3DES 166 Changing Principal Attributes Attributes Tab Principal Information 12 describes the components of the Attributes tabAttributes Tab Components Allow Postdated Components DescriptionAllow Renewable Tickets170 Allow Proxy Components Description Allow ForwardableAllow Duplicate Session KeysRequire Password PreauthenticationComponents Description Require ChangeComponents Description Lock Principal Allow As ServiceSet As Password AuthenticationChange Service Components Description Require InitialLdap Attributes Tab Prinicpal Information Window 176 Deleting a Service Principal Extracting Service Keys Chapter 179 Extracting a Service Key Table Service Key Extract Service Key Table ComponentsComponent Description Principal Table TypeEditing the Default Group Using Groups to Control SettingsChapter 183 Group Information Window Principal InformationEditEdit Default Group to display the Group Group Information Window ComponentsComponent Description Group Default Principal Attributes Setting the Default Group Principal AttributesPrincipal Attributes Component DescriptionChapter 187 Setting Administrative Permissions 11 Administrative Permissions Window Administrative PermissionsPrincipals Add PrincipalsModify Principals Inquire aboutDefaults Override the Principal InformationEditEdit Group DefaultInformationEditEdit Default GroupGroup Information Component Description Restricted192 Realms Tab Realms Tab Components Realms TabRealm Information Window Components Realm Information WindowAdding a Realm Deleting a Realm Remote Administrator kadminui Logon Screen Logon screen displays as shown in Figure200 Chapter 201 Manual Administration Using kadmin Chapter 203 Adding a New Principal Adding a Random Key Specifying a New PasswordDeleting a Principal Changing Password to a New Randomly Generated3DES Extracting a PrincipalModifying a Principal Listing the Attributes of a PrincipalNumber of Authentication Failures fcnt Key Version Number Attribute Policy Name AttributesAllow Postdated Attribute Allow Renewable Attribute Allow Forwardable Attribute Allow Proxy Attribute Allow Duplicate Session Key Attribute Require Password Change Attribute Require Preauthentication AttributeLock Principal Attribute Allow As Service Attribute Principal InformationEditEdit Administrative Permissions Require Initial Authentication AttributeAuthentication Select Require Initial Authentication Set As Password Change Service AttributeNo text shows Password Expiration Attribute Maximum Ticket Lifetime Attribute Principal Expiration AttributeMaximum Renew Time Attribute Key Type AttributeSalt Type Attribute Principal Database Utilities Principal Database UtilitiesUtility Task Kerberos Database Utilities 226 Database Encryption Database Master Password Destroying the Kerberos Database 230 Dumping the Kerberos Database Loading the Kerberos Database Stashing the Master Key 234 Starting and Stopping Daemons Starting and Stopping Daemons and Services SituationMaster Password Maintenance TasksProtecting Security Server Secrets Host/fqdn@REALMBacking Up the Principal Database Backing Up primary security server Data238 Removing Unused Space from the Database 240 Propagating the Kerberos 242 Propagation Relationships Propagation HierarchyService Key Table Extracting a Key to the Service Key Table FileMaintaining Secret Keys in the Key Table File Deleting Older Keys from the Service Key Table File Creating a New Service Key Table FilePropagation Tools If You Want To Use This Tool Propagation ToolsOne or more servers once Propagation is configured Started Kpropd Daemon Mkpropcf Tool 250 Kpropd.ini File Sections Defaultvalues SectionChapter 253 Secsrvname Section Configuration file Examples256 Prpadmin Administrative Application Setting Up Propagation Daemon Name Function Generic Usage Primary security server Services and Daemons260 Chapter 261 262 Critical Error Messages Monitoring PropagationMonitoring the Log File Monitoring Old File Date and Large File Size Monitoring Propagation Queue FilesAuthentication problems Updating the principal.ok Time StampComparing the Database to Its Copies Administration appears normal Log files indicate problemsMismatch between the number of principals Kdbdump Utility Restarting Propagation Using the Full Dump Method Restarting Propagation Using a Simple ProcessPropagation Failure Security server Converting a secondary security server to a primaryCleaning the Temp Directory Restarting ServicesConfiguring Multirealm Enterprises Number of Realms per DatabasePrimary security servers Supporting Multiple Realms Adding More Realms to a Multirealm Database Multiple primary security servers Supporting a Single RealmDatabase Propagation for Multirealm Databases Managing Multiple Realms 276 Considering a Trust Relationship One-Way TrustTwo-Way Trust Other Types of Trust Hierarchical TrustConfiguring Direct Trust Relationships 280 Hierarchical Chain of Trust Hierarchical Interrealm TrustHierarchical Interrealm Configuration Chapter 283 Configuring the Local Realm Configuring the Intermediate Realm Configuring the Target Realm Hierarchical Interrealm Trust Chapter 287 288 Troubleshooting 290 Characterizing a Problem 292 Diagnostic Tools Summary Diagnostic ToolsTool Description Name Troubleshooting Kerberos Error MessagesLogging Capabilities Unix Syslog File Services Checklist Troubleshooting TechniquesTroubleshooting Scenarios Cause Tips Troubleshooting Scenarios 298 Server Scenario Cause Troubleshooting Tips Troubleshooting Scenarios for your LDAP-based Kerberos300 Chapter 301 302 Forgotten Passwords General ErrorsClock Synchronization Locking and Unlocking AccountsDecrypt Integrity Check Failed User Error MessagesAdministrative Error Messages Password Has Expired While Getting Initial TicketService Key Not Available While Getting Initial Ticket Chapter 307 Reporting Problems to Your HP Support Contact Chapter 309 310 Configuration Worksheet Appendix a Appendix a 313 314 Sample krb.conf File Appendix B Services File 318 Sample krb.realms File Appendix C Key Distribution Center See KDC GlossaryGlossary Ticket-granting ticket See TGT V5srvtabTicket-granting ticket Index Symbols326 327
Related manuals
Manual 13 pages 9.67 Kb Manual 285 pages 23.05 Kb