Search squid archive

Re: Re: kerberos authentication with load balancers

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello Markus

Thank you very much, everything works now. Only two question left
1) Is it necessary to run commands specified below every 30 day?

msktutil --auto-update --verbose --computer-name proxy1-k
msktutil --auto-update --verbose --computer-name proxy2-k
msktutil --auto-update --verbose --computer-name proxy-k

As I understand I should run them on one proxy1 and then copy updated
keytab file to proxy2 every month.

2) Can I use kerberos somehow to authenticate skype? All internet
browsers work but skype doesn't, only works by specifying user/pass in
configuration and as I think it uses basic ldap auth.
    When there was NTLM auth, it worked, but now I removed all NTLM from
squid, only kerberos negotiate and basic is left.

George

On 26/07/14 15:55, Markus Moeller wrote:
> Hi Giorgi,
>
>   It would be
>
> msktutil -c -b "CN=COMPUTERS" -s HTTP/proxy1.domain.com -h
> proxy1.domain.com -k /root/keytab/PROXY.keytab --computer-name PROXY1-K
> --upn HTTP/proxy1.domain.com--server addc03.domain.com --verbose
> --enctypes 28
>
> msktutil -c -b "CN=COMPUTERS" -s HTTP/proxy2.domain.com -h
> proxy2.domain.com -k /root/keytab/PROXY.keytab --computer-name PROXY2-K
> --upn HTTP/proxy2.domain.com --server addc03.domain.com --verbose
> --enctypes 28
>
> and one for DNS RR record
>
> msktutil -c -b "CN=COMPUTERS" -s HTTP/proxy.mia.gov.ge -h
> proxy1.domain.com -k /root/keytab/PROXY.keytab --computer-name PROXY-K
> --upn HTTP/proxy.mia.gov.ge --server addc03.domain.com --verbose
> --enctypes 28
>
> The -h value is not really used.  So for the DNS RR you can use either
> name.
>
> Regards
> Markus
>
>
> "Giorgi Tepnadze"  wrote in message news:53D219EA.1010504@xxxxxxxxxx...
>
> Hi Markus
>
> Excuse me for posting in old list, but I have a small question:
>
> So I have 2 squid servers (proxy1.domain.com and proxy2.domain.com) and
> one DNS RR record (proxy.mia.gov.ge). Regarding your recommendation how
> should I create keytab file.
>
> msktutil -c -b "CN=COMPUTERS" -s HTTP/proxy1.domain.com -h
> proxy1.domain.com -k /root/keytab/PROXY.keytab --computer-name PROXY1-K
> --upn HTTP/proxy1.mia.gov.ge --server addc03.domain.com --verbose
> --enctypes 28
> msktutil -c -b "CN=COMPUTERS" -s HTTP/proxy2.domain.com -h
> proxy2.domain.com -k /root/keytab/PROXY.keytab --computer-name PROXY2-K
> --upn HTTP/proxy2.mia.gov.ge --server addc03.domain.com --verbose
> --enctypes 28
>
> and one for DNS RR record
>
> msktutil -c -b "CN=COMPUTERS" -s HTTP/proxy.domain.com -h
> proxy1.domain.com -k /root/keytab/PROXY.keytab --computer-name PROXY2-K
> --upn HTTP/proxy.mia.gov.ge --server addc03.domain.com --verbose
> --enctypes 28
>
> But there is problem with last one, which server name should I put in
> -s, -h, --upn and --computer-name?
>
> Many Thanks
>
> George
>
>
>
> On 07/02/14 01:26, Markus Moeller wrote:
>> Hi Joseph,
>>
>>   it is all possible :-)
>>
>>   Firstly I suggest not to use samba tools to create the squid keytab,
>> but use msktutil (see
>> http://wiki.squid-cache.org/ConfigExamples/Authenticate/Kerberos).
>> Then create a keytab for the loadbalancer name ( that is the one
>> configured in IE or Firefox). use this keytab on both proxy servers
>> and use negotiate_kerberos_auth with  -s GSS_C_NO_NAME
>>
>>  When you say multiple realms, do you have trust between the AD
>> domains or are they separate ?   If the domains do not have trust do
>> you intend to use the same loadbalancer name for the users of both
>> domains ?
>>
>> Markus
>>
>>
>>
>> "Joseph Spadavecchia"  wrote in message
>> news:2B43C569F8254A4E82C948CE4C247ED515891A@xxxxxxxxxxxxx.local...
>>
>> Hi there,
>>
>> What is the recommended way to configure Kerberos authentication
>> behind two load balancers?
>>
>> AFAIK, based on the mailing lists, I should
>>
>> 1) Create a user account KrbUser on the AD server and add an SPN
>> HTTP/loadbalancer.example.com for the load balancer
>> 2) Join the domain with Kerberos and kinit
>> 3) net ads keytab add HTTP/loadbalancer.example.com@REALM -U KrbUser
>> 4) update squid.conf with an auth helper like negotiate_kerberos_auth
>> -s HTTP/loadbalancer.example.com@REALM
>>
>> Unfortunately, when I try this it fails.
>>
>> The only way I could get it to work at all was by removing the SPN
>> from the KrbUser and associating the SPN with the machine trust
>> account (of the proxy behind the loadbalancer)  However, this is not a
>> viable solution since there are two machines behind the load balancer
>> and AD only allows you to associate a SPN with one account.
>>
>> Furthermore, given that I needed step (4) above, is it possible to
>> have load balanced Kerberos authentication working with multiple
>> realms?  If so, then how?
>>
>> Many thanks.
>>
>
>





[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux