KerbNet includes software and documentation developed at the Massachusetts Institute of Technology, which includes this copyright information:
Copyright © 1995, 1997 by the Massachusetts Institute of Technology.
Export of software employing encryption from the United States of America is assumed to require a specific license from the United States Government. It is the responsibility of any person or organization contemplating export to obtain such a license before exporting.
WITHIN THAT CONSTRAINT, permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of M.I.T. not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. M.I.T. makes no representations about the suitability of this software for any purpose. It is provided "as is" without express or implied warranty.
KerbNet includes software and documentation developed by OpenVision Technologies, Inc., which includes this copyright notice:
The following copyright and permission notice applies to the OpenVision Kerberos Administration system located in kadmin/create, kadmin/dbutil, kadmin/server, lib/kadm, and portions of lib/rpc:
Copyright, OpenVision Technologies, Inc., 1996, All Rights Reserved WARNING: Retrieving the OpenVision Kerberos Administration system source code, as described below, indicates your acceptance of the following terms. If you do not agree to the following terms, do not retrieve the OpenVision Kerberos administration system. You may freely use and distribute the Source Code and Object Code compiled from it, but this Source Code is provided to you "AS IS" EXCLUSIVE OF ANY WARRANTY, INCLUDING, WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, OR ANY OTHER WARRANTY, WHETHER EXPRESS OR IMPLIED. IN NO EVENT WILL OPENVISION HAVE ANY LIABILITY FOR ANY LOST PROFITS, LOSS OF DATA OR COSTS OF PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES, OR FOR ANY SPECIAL, INDIRECT, OR CONSEQUENTIAL DAMAGES ARISING OUT OF THIS AGREEMENT, INCLUDING, WITHOUT LIMITATION, THOSE RESULTING FROM THE USE OF THE SOURCE CODE, OR THE FAILURE OF THE SOURCE CODE TO PERFORM, OR FOR ANY OTHER REASON.OpenVision retains all rights, title, and interest in the donated Source Code. With respect to OpenVision's copyrights in the donated Source Code, OpenVision also retains rights to derivative works of the Source Code whether created by OpenVision or a third party. OpenVision Technologies, Inc. has donated this Kerberos Administration system to MIT for inclusion in the standard Kerberos 5 distribution. This donation underscores our commitment to continuing Kerberos technology development and our gratitude for the valuable work which has been performed by MIT and the Kerberos community.
KerbNet includes software and documentation developed at the University of California at Berkeley, which includes this copyright notice:
Copyright © 1983 Regents of the University of California.
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
This product includes software developed by the University of California, Berkeley and its contributors.
Permission is granted to make and distribute verbatim copies of this manual provided the copyright notices and this permission notice are preserved on all copies.
Permission is granted to copy and distribute modified versions of this manual under the conditions for verbatim copying, provided also that the entire resulting derived work is distributed under the terms of a permission notice identical to this one.
Permission is granted to copy and distribute translations of this manual into another language, under the above conditions for modified versions.
As with most software upgrades, KerbNet is generally backward compatible but not necessarily forward compatible. The KerbNet daemons can interoperate with Kerberos V4 clients, but most of the Kerberos V4 daemons can not interoperate with Kerberos V5 clients. This suggests the following strategy for performing the upgrade:
The Kerberos krb5.conf
and KDC kdc.conf
configuration
files allow additional tags for Kerberos V4 compatibility.
If you used the defaults, both when you installed Kerberos V4 and when you installed KerbNet, you should not need to include any of these tags. However, some or all of them may be necessary for nonstandard installations. Check that they are set correctly.
In the [libdefaults] section, the following additional tags may be used:
/etc/srvtab
.
/etc/krb.conf
.
/etc/krb.realms
.
In the [realms] section, the following Kerberos V4 tags may be used:
Because Kerberos V4 requires a different type of salt for the encryption
type, you will need to verify that the supported_enctypes
line in the
[realms] section reads as follows:
supported_enctypes = des-cbc-crc:normal des-cbc-crc:v4
This is the only change needed to the kdc.conf
file. This should
normally be done by the KerbNet configuration script, but may
not be if configuration files from a previous installation of Kerberos
or KerbNet were found.
To convert your KDCs from Kerberos V4 to KerbNet, do the following:
kadmind
(V4) daemon process on the master KDC and kill
it. This will prevent changes to the Kerberos database while you
convert the database to the new Kerberos V5 format.
% kdb_util dump /usr/cygnus/kerbnet-1.2/lib/krb5kdc/v4-dump
% kdb5_util load_v4 v4-dump
kerberos
daemon on each of the KDCs.
krb524d
, by issuing
the command:
% /usr/cygnus/kerbnet/sbin/krb524d -m > /dev/null &
Add the above line to your /etc/rc
(or /etc/rc.local
) file
on each KDC just after it runs the rc.master
or rc.slave
script.
Install KerbNet on each application server, according to the instructions in the KerbNet Installation Guide, with the following exceptions:
# /usr/cygnus/kerbnet/sbin/ktutil ktutil: rst /etc/krb-srvtab ktutil: wkt /etc/v5srvtab ktutil: q #
/etc/krb-srvtab
. Instructions for this are in the
installation guide, under the discussion of updating a KDC from an older
version of Kerberos V5. Delete the V4 host key from
/etc/krb-srvtab
as it is no longer valid.
Install KerbNet on each client machine, according to the instructions in the KerbNet Installation Guide.
Tell your users to add the appropriate directory to their paths. On
UNIX machines, this will probably be /usr/cygnus/kerbnet/bin
.
Note that if you upgrade your client machines before all of your application servers are upgraded, your users will need to use the Kerberos V4 programs to connect to application servers that are still running Kerberos V4. (The one exception is the UNIX version of KerbNet telnet, which can connect to a Kerberos V4 and Kerberos V5 application servers.) Users can use either the Kerberos V4 or KerbNet programs to connect to Kerberos V5 servers.
KerbNet uses port 88, which is the port assigned by the IETF, for KDC requests. Kerberos V4 used port 750. If your users will need to get to any KDCs outside your firewall, you will need to allow TCP and UDP requests on port 88 for your users to get to off-site Kerberos V5 KDCs, and on port 750 for your users to get to off-site Kerberos V4 KDCs.