61
Kerberos V, OpenLDAP, OpenAFS Using Debian GNU/Linux Dr. Wolfgang A. Gehrke [email protected] Dipartimento di Informatica e Automazione Universit ` a degli Studi Roma Tre Kerberos, LDAP, AFS; W.A. Gehrke – p. 1/13

Using Debian GNU/Linux

  • Upload
    others

  • View
    17

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Using Debian GNU/Linux

Kerberos V, OpenLDAP, OpenAFSUsing Debian GNU/Linux

Dr. Wolfgang A. [email protected]

Dipartimento di Informatica e Automazione

Universit̀a degli Studi Roma Tre

Kerberos, LDAP, AFS; W.A. Gehrke – p. 1/13

Page 2: Using Debian GNU/Linux

Overview

Kerberos, LDAP, AFS; W.A. Gehrke – p. 2/13

Page 3: Using Debian GNU/Linux

Overview

short site report

Kerberos, LDAP, AFS; W.A. Gehrke – p. 2/13

Page 4: Using Debian GNU/Linux

Overview

short site report

our motivation for alternative cell

Kerberos, LDAP, AFS; W.A. Gehrke – p. 2/13

Page 5: Using Debian GNU/Linux

Overview

short site report

our motivation for alternative cell

core architecture =Kerberos V + OpenLDAP + OpenAFS

Kerberos, LDAP, AFS; W.A. Gehrke – p. 2/13

Page 6: Using Debian GNU/Linux

Overview

short site report

our motivation for alternative cell

core architecture =Kerberos V + OpenLDAP + OpenAFS

benefits of this core

Kerberos, LDAP, AFS; W.A. Gehrke – p. 2/13

Page 7: Using Debian GNU/Linux

Overview

short site report

our motivation for alternative cell

core architecture =Kerberos V + OpenLDAP + OpenAFS

benefits of this core

implementation with Debian

Kerberos, LDAP, AFS; W.A. Gehrke – p. 2/13

Page 8: Using Debian GNU/Linux

Overview

short site report

our motivation for alternative cell

core architecture =Kerberos V + OpenLDAP + OpenAFS

benefits of this core

implementation with Debian

application scenarios

Kerberos, LDAP, AFS; W.A. Gehrke – p. 2/13

Page 9: Using Debian GNU/Linux

Overview

short site report

our motivation for alternative cell

core architecture =Kerberos V + OpenLDAP + OpenAFS

benefits of this core

implementation with Debian

application scenarios

gained experience

Kerberos, LDAP, AFS; W.A. Gehrke – p. 2/13

Page 10: Using Debian GNU/Linux

Overview

short site report

our motivation for alternative cell

core architecture =Kerberos V + OpenLDAP + OpenAFS

benefits of this core

implementation with Debian

application scenarios

gained experience

next steps

Kerberos, LDAP, AFS; W.A. Gehrke – p. 2/13

Page 11: Using Debian GNU/Linux

Site Report

current cell vn.uniroma3.it for≥ 10 years

alternative cell dia.uniroma3.it for≈ 2 years

servers Dell PowerEdge SCSI HW RAID5

clients (AIX), Linux, MacOS X, (Windows XP)

volumes many backups, few replicas, some copies

backups to file on hard disk

users students, lecturer, staff

conventional usehomes, mail, web

advanced usecomputer based exams, lab software

useful new commands found in OpenAFS

Kerberos, LDAP, AFS; W.A. Gehrke – p. 3/13

Page 12: Using Debian GNU/Linux

Context

departmentpart of Engineering from our university

hardware32bit Intel off-the-shelf

softwaremainly open source, Windows Campus licence

Linux distributionsDebian, Gentoo, Ubuntu

advancing technologiesparallel, distributed, grid computing;new Windows 2000 server architecture

Kerberos, LDAP, AFS; W.A. Gehrke – p. 4/13

Page 13: Using Debian GNU/Linux

Motivation for alternative Cell

1. cell vn.uniroma3.it with external support

2. customized RedHat Linux

3. started with Transarc and now OpenAFS

4. on “AS IS” blackbox basis

5. born during the period of many UNIX dialects

6. no direct access to AFS administrative commands

7. kaserver (now fakeka) + NIS based

8. local mail spool but UW-imap folders in AFS

9. some ACLs with IPs but no keytabs

Kerberos, LDAP, AFS; W.A. Gehrke – p. 5/13

Page 14: Using Debian GNU/Linux

Core Architecture Shift

Kerberos, LDAP, AFS; W.A. Gehrke – p. 6/13

Page 15: Using Debian GNU/Linux

Core Architecture Shift

kaserver

RedHatNIS Transarc AFS

��

@@

@

Kerberos, LDAP, AFS; W.A. Gehrke – p. 6/13

Page 16: Using Debian GNU/Linux

Core Architecture Shift

kaserver

RedHatNIS Transarc AFS

��

@@

@

MIT Kerberos V

Debian

OpenLDAP OpenAFS

@@

@

��

Kerberos, LDAP, AFS; W.A. Gehrke – p. 6/13

Page 17: Using Debian GNU/Linux

Core Architecture Shift

kaserver

RedHatNIS Transarc AFS

��

@@

@

MIT Kerberos V

Debian

OpenLDAP OpenAFS

@@

@

��

�?

Kerberos, LDAP, AFS; W.A. Gehrke – p. 6/13

Page 18: Using Debian GNU/Linux

Core Architecture Shift

kaserver

RedHatNIS Transarc AFS

��

@@

@

MIT Kerberos V

Debian

OpenLDAP OpenAFS

@@

@

��

�?

Kerberos, LDAP, AFS; W.A. Gehrke – p. 6/13

Page 19: Using Debian GNU/Linux

Core Architecture Shift

kaserver

RedHatNIS Transarc AFS

��

@@

@

MIT Kerberos V

Debian

OpenLDAP OpenAFS

@@

@

��

�?

?

Kerberos, LDAP, AFS; W.A. Gehrke – p. 6/13

Page 20: Using Debian GNU/Linux

Core Architecture Shift

kaserver

RedHatNIS Transarc AFS

��

@@

@

MIT Kerberos V

Debian

OpenLDAP OpenAFS

@@

@

��

�?

? ?

Kerberos, LDAP, AFS; W.A. Gehrke – p. 6/13

Page 21: Using Debian GNU/Linux

Benefits of this Core

Kerberos, LDAP, AFS; W.A. Gehrke – p. 7/13

Page 22: Using Debian GNU/Linux

Benefits of this Core

KRB5: centralized authenticationmaster and slavePAM module

Kerberos, LDAP, AFS; W.A. Gehrke – p. 7/13

Page 23: Using Debian GNU/Linux

Benefits of this Core

KRB5: centralized authenticationmaster and slavePAM module

LDAP: centralized informationreplicationSASL with GSSAPI

Kerberos, LDAP, AFS; W.A. Gehrke – p. 7/13

Page 24: Using Debian GNU/Linux

Benefits of this Core

KRB5: centralized authenticationmaster and slavePAM module

LDAP: centralized informationreplicationSASL with GSSAPI

OpenAFS: distributed filesystemredundancyallows for mail and web integrationlow-cost NAS/SAN substitution over Ethernet

Kerberos, LDAP, AFS; W.A. Gehrke – p. 7/13

Page 25: Using Debian GNU/Linux

Implementation with Debian

Kerberos, LDAP, AFS; W.A. Gehrke – p. 8/13

Page 26: Using Debian GNU/Linux

Implementation with Debian

MIT Kerberos V+OpenLDAP+OpenAFS: out of the box

Kerberos, LDAP, AFS; W.A. Gehrke – p. 8/13

Page 27: Using Debian GNU/Linux

Implementation with Debian

MIT Kerberos V+OpenLDAP+OpenAFS: out of the box

apache2 postfix-tls courier-imap-ssl

KRB5

LDAPoAFS

Kerberos, LDAP, AFS; W.A. Gehrke – p. 8/13

Page 28: Using Debian GNU/Linux

Implementation with Debian

MIT Kerberos V+OpenLDAP+OpenAFS: out of the box

apache2 postfix-tls courier-imap-ssl

KRB5 mod-auth-kerb saslauthd courierauthdkeytab PAM PAM

LDAP UserDir aliases HOMEoAFS mod_dav procmail MAILDIR

DAV access MAILDIR access

Kerberos, LDAP, AFS; W.A. Gehrke – p. 8/13

Page 29: Using Debian GNU/Linux

Implementation with Debian

MIT Kerberos V+OpenLDAP+OpenAFS: out of the box

apache2 postfix-tls courier-imap-ssl

KRB5 mod-auth-kerb saslauthd courierauthdkeytab PAM PAM

LDAP UserDir aliases HOMEoAFS mod_dav procmail MAILDIR

DAV access MAILDIR access

ssh inn2 postgresql

KRB5LDAPoAFS

Kerberos, LDAP, AFS; W.A. Gehrke – p. 8/13

Page 30: Using Debian GNU/Linux

Implementation with Debian

MIT Kerberos V+OpenLDAP+OpenAFS: out of the box

apache2 postfix-tls courier-imap-ssl

KRB5 mod-auth-kerb saslauthd courierauthdkeytab PAM PAM

LDAP UserDir aliases HOMEoAFS mod_dav procmail MAILDIR

DAV access MAILDIR access

ssh inn2 postgresql

KRB5 GSSAPI + PAM RADIUS + PAM keytabLDAP NSSoAFS HOME (spool) (backup)

Kerberos, LDAP, AFS; W.A. Gehrke – p. 8/13

Page 31: Using Debian GNU/Linux

Redundancy

Kerberos, LDAP, AFS; W.A. Gehrke – p. 9/13

Page 32: Using Debian GNU/Linux

Redundancy

ntp1,dns1,kdc1,ldap1,db1

2 3� @

Kerberos, LDAP, AFS; W.A. Gehrke – p. 9/13

Page 33: Using Debian GNU/Linux

Redundancy

ntp1,dns1,kdc1,ldap1,db1

2 3� @

dhcp1,tftp1,fs1

dhcp2,tftp2,fs2

Kerberos, LDAP, AFS; W.A. Gehrke – p. 9/13

Page 34: Using Debian GNU/Linux

Redundancy

ntp1,dns1,kdc1,ldap1,db1

2 3� @

dhcp1,tftp1,fs1

dhcp2,tftp2,fs2

smb1,(ldap)

smb2,(ldap’)

@

Kerberos, LDAP, AFS; W.A. Gehrke – p. 9/13

Page 35: Using Debian GNU/Linux

Redundancy

ntp1,dns1,kdc1,ldap1,db1

2 3� @

dhcp1,tftp1,fs1

dhcp2,tftp2,fs2

smb1,(ldap)

smb2,(ldap’)

@

smtp,imap,web

smtp,imap,web

Kerberos, LDAP, AFS; W.A. Gehrke – p. 9/13

Page 36: Using Debian GNU/Linux

Redundancy

ntp1,dns1,kdc1,ldap1,db1

2 3� @

dhcp1,tftp1,fs1

dhcp2,tftp2,fs2

smb1,(ldap)

smb2,(ldap’)

@

smtp,imap,web

smtp,imap,web

mysql,postgres,nntp,RADIUS,mailman

Kerberos, LDAP, AFS; W.A. Gehrke – p. 9/13

Page 37: Using Debian GNU/Linux

Computer Based Exams

Kerberos, LDAP, AFS; W.A. Gehrke – p. 10/13

Page 38: Using Debian GNU/Linux

Computer Based Exams

1. rc.local in AFS space

kiosk modepermits firewall activation

Kerberos, LDAP, AFS; W.A. Gehrke – p. 10/13

Page 39: Using Debian GNU/Linux

Computer Based Exams

1. rc.local in AFS space

kiosk modepermits firewall activation

2. generic user on lab computer with IP based ACL

symbolic link into IP enabled work spacesimilar to possible NFS setting

Kerberos, LDAP, AFS; W.A. Gehrke – p. 10/13

Page 40: Using Debian GNU/Linux

Computer Based Exams

1. rc.local in AFS space

kiosk modepermits firewall activation

2. generic user on lab computer with IP based ACL

symbolic link into IP enabled work spacesimilar to possible NFS setting

3. home volume replacement

for specialized examsprepare fresh empty volumeset real home volume offline during exam

Kerberos, LDAP, AFS; W.A. Gehrke – p. 10/13

Page 41: Using Debian GNU/Linux

Administration Tools with PROLOG

Kerberos, LDAP, AFS; W.A. Gehrke – p. 11/13

Page 42: Using Debian GNU/Linux

Administration Tools with PROLOG

scope: static analysis + basic operations(not full-blown ADM server)

Kerberos, LDAP, AFS; W.A. Gehrke – p. 11/13

Page 43: Using Debian GNU/Linux

Administration Tools with PROLOG

scope: static analysis + basic operations(not full-blown ADM server)

need consistency between data basesfor Kerberos, LDAP, and pts

Kerberos, LDAP, AFS; W.A. Gehrke – p. 11/13

Page 44: Using Debian GNU/Linux

Administration Tools with PROLOG

scope: static analysis + basic operations(not full-blown ADM server)

need consistency between data basesfor Kerberos, LDAP, and pts

simple db extraction to file in Prolog syntax

Kerberos, LDAP, AFS; W.A. Gehrke – p. 11/13

Page 45: Using Debian GNU/Linux

Administration Tools with PROLOG

scope: static analysis + basic operations(not full-blown ADM server)

need consistency between data basesfor Kerberos, LDAP, and pts

simple db extraction to file in Prolog syntax

this file gets just loaded into Prolog

Kerberos, LDAP, AFS; W.A. Gehrke – p. 11/13

Page 46: Using Debian GNU/Linux

Administration Tools with PROLOG

scope: static analysis + basic operations(not full-blown ADM server)

need consistency between data basesfor Kerberos, LDAP, and pts

simple db extraction to file in Prolog syntax

this file gets just loaded into Prolog

consistency easy to express with logic programming

Kerberos, LDAP, AFS; W.A. Gehrke – p. 11/13

Page 47: Using Debian GNU/Linux

Administration Tools with PROLOG

scope: static analysis + basic operations(not full-blown ADM server)

need consistency between data basesfor Kerberos, LDAP, and pts

simple db extraction to file in Prolog syntax

this file gets just loaded into Prolog

consistency easy to express with logic programming

backtracking suitable for “undo” operation

Kerberos, LDAP, AFS; W.A. Gehrke – p. 11/13

Page 48: Using Debian GNU/Linux

Administration Tools with PROLOG

scope: static analysis + basic operations(not full-blown ADM server)

need consistency between data basesfor Kerberos, LDAP, and pts

simple db extraction to file in Prolog syntax

this file gets just loaded into Prolog

consistency easy to express with logic programming

backtracking suitable for “undo” operation

need to extend initial scripts

Kerberos, LDAP, AFS; W.A. Gehrke – p. 11/13

Page 49: Using Debian GNU/Linux

Further Gained Experience

Kerberos, LDAP, AFS; W.A. Gehrke – p. 12/13

Page 50: Using Debian GNU/Linux

Further Gained Experience

secure services require SSL/TLS

Kerberos, LDAP, AFS; W.A. Gehrke – p. 12/13

Page 51: Using Debian GNU/Linux

Further Gained Experience

secure services require SSL/TLS

implementation of a small in-house PKI

Kerberos, LDAP, AFS; W.A. Gehrke – p. 12/13

Page 52: Using Debian GNU/Linux

Further Gained Experience

secure services require SSL/TLS

implementation of a small in-house PKI

mainly for private host keys and certificates

Kerberos, LDAP, AFS; W.A. Gehrke – p. 12/13

Page 53: Using Debian GNU/Linux

Further Gained Experience

secure services require SSL/TLS

implementation of a small in-house PKI

mainly for private host keys and certificates

user certificates can be published in LDAP

Kerberos, LDAP, AFS; W.A. Gehrke – p. 12/13

Page 54: Using Debian GNU/Linux

Further Gained Experience

secure services require SSL/TLS

implementation of a small in-house PKI

mainly for private host keys and certificates

user certificates can be published in LDAP

users can benefit from e.g. USB tokens (smartcards)

Kerberos, LDAP, AFS; W.A. Gehrke – p. 12/13

Page 55: Using Debian GNU/Linux

Further Gained Experience

secure services require SSL/TLS

implementation of a small in-house PKI

mainly for private host keys and certificates

user certificates can be published in LDAP

users can benefit from e.g. USB tokens (smartcards)

possibilities:

- certificate based mail relay- certificate based web access- mail signing and encryption

Kerberos, LDAP, AFS; W.A. Gehrke – p. 12/13

Page 56: Using Debian GNU/Linux

Next Steps

Kerberos, LDAP, AFS; W.A. Gehrke – p. 13/13

Page 57: Using Debian GNU/Linux

Next Steps

1. adding firewall rules (DDOS)

Kerberos, LDAP, AFS; W.A. Gehrke – p. 13/13

Page 58: Using Debian GNU/Linux

Next Steps

1. adding firewall rules (DDOS)

2. server hardening (SELinux)

Kerberos, LDAP, AFS; W.A. Gehrke – p. 13/13

Page 59: Using Debian GNU/Linux

Next Steps

1. adding firewall rules (DDOS)

2. server hardening (SELinux)

3. Ubuntu on server

Kerberos, LDAP, AFS; W.A. Gehrke – p. 13/13

Page 60: Using Debian GNU/Linux

Next Steps

1. adding firewall rules (DDOS)

2. server hardening (SELinux)

3. Ubuntu on server

... AND ...2007 book by Springer with Ing. Franco Milicchio

“Distributed Services with OpenAFSfor Enterprise and Education”

Kerberos, LDAP, AFS; W.A. Gehrke – p. 13/13

Page 61: Using Debian GNU/Linux

Next Steps

1. adding firewall rules (DDOS)

2. server hardening (SELinux)

3. Ubuntu on server

... AND ...2007 book by Springer with Ing. Franco Milicchio

“Distributed Services with OpenAFSfor Enterprise and Education”

PLUS: help wanted for AIX(5.2 on a donated pSeries for CATIA)

Kerberos, LDAP, AFS; W.A. Gehrke – p. 13/13