SlackwareThis Forum is for the discussion of Slackware Linux.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
sorry Niki, but I think Didier is right: what is the purpose of reviving this thread, just for quotin a three months' old statement?
maybe the discussion should be carried on in one place only.
The other thread is "Solved" and it is going off-topic.
Also, 3 months is not that long.
If it is, kindly ask a moderator to move my post to the more recent thread.
I think this is an interesting subject that deserves a distinct thread (rather than being drowned here in the usual PAM uproar)
Could this post could be moved in its own thread? ("PAM only, no kerberos") - maybe the simplest would be for Slax-Dude to re-post in a new thread?
Since we will likely never do "PAM only, no Kerberos" there's little use for a thread like that. Better to keep the flamewars in as few threads as possible, IMHO.
Since we will likely never do "PAM only, no Kerberos" there's little use for a thread like that. Better to keep the flamewars in as few threads as possible, IMHO.
Well, maybe I was naive, thinking that a distinct thread could be flamewar-free on this subject... but I get your point.
Regarding "we will likely never do "PAM only, no Kerberos"", I am curious about your rationale.
Anyway, this is an interesting clarification about what to expect. Thanks.
Regarding "we will likely never do "PAM only, no Kerberos"", I am curious about your rationale.
Just a guess, but I'd guess PAM without kerberos would take away too much expected functionality of a PAM system. Just like with adding pulseaudio (making it the default rather than piping all pulseaudio stuff through alsa), if/when they do it, they will probably do it right (as they always do) and get the implementation of PAM that most would expect.
Just a guess, but I'd guess PAM without kerberos would take away too much expected functionality of a PAM system.
*nod* it would make it useless for my particular use-case, where permission to access servers is expected to be controlled from a central corporate AD server (which typically uses Kerberos authentication).
I completely sympathize with the wariness over krb5's invasiveness, though.
Perhaps there's an alternative, or a way to make krb5 better-encapsulated. Will ponder.
*nod* it would make it useless for my particular use-case, where permission to access servers is expected to be controlled from a central corporate AD server (which typically uses Kerberos authentication).
I think this is a pretty common use case.
Let's say Bob is a sysadmin and has to access hundreds of Unix servers via SSH. A good practice is obviously to request that Bob logs into servers as Bob (then su / sudo) for traceability.
Bob is logged on his Windows PC on the AD domain. Bob fires putty and goes to some server. At the login prompt, he enters his name and password (his password in the AD domain - same as the Windows password). On the server, Bob is authenticated by AD, and enters a server session under his identity.
No Kerberos is required for this scenario on the server. PAM (with the standard LDAP auth module) is enough.
Now maybe what we would like to achieve is single sign-on login (SSO): Bob fires putty, goes to the server and is automatically authenticated by AD (no need to enter his password again, his Windows authentication is transparently reused for servers where he is authorized). In that SSO scenario, Kerberos is used in the background (IIRC, putty supports GSSAPI/Kerberos with SSH2)
I believe that the first scenario (LDAP authentication) is quite common and much simpler to implement.
That said, I perfectly understand that
- supporting this sort of environment is not a priority for the Slackware team,
- it may be better for Slackware to either implement all the kit (PAM + Kerberos + deps + pamified/kerberized apps) like all major distros, or else implement nothing, rather than a partial solution.
Let's say Bob is a sysadmin and has to access hundreds of Unix servers via SSH. A good practice is obviously to request that Bob logs into servers as Bob (then su / sudo) for traceability.
Bob is logged on his Windows PC on the AD domain. Bob fires putty and goes to some server. At the login prompt, he enters his name and password (his password in the AD domain - same as the Windows password). On the server, Bob is authenticated by AD, and enters a server session under his identity.
No Kerberos is required for this scenario on the server. PAM (with the standard LDAP auth module) is enough.
.
.
.
I believe that the first scenario (LDAP authentication) is quite common and much simpler to implement.
That is not correct.
A Directory consists of:
- LDAP database that replaces /etc/passwd and /etc/group and optionally other flat files.
- Kerberos database and KDC that replace /etc/shadow.
Passwords are managed by Kerberos. On the server you need something like this:
Samba uses Heimdal internally so it works even if you don't have a system wide Kerberos install.
Quote:
Originally Posted by philanc
Now maybe what we would like to achieve is single sign-on login (SSO): Bob fires putty, goes to the server and is automatically authenticated by AD (no need to enter his password again, his Windows authentication is transparently reused for servers where he is authorized). In that SSO scenario, Kerberos is used in the background (IIRC, putty supports GSSAPI/Kerberos with SSH2)
Yes. You need a system wide install for all other software to be Kerberos aware. Also do not forget NFSv4.
Quote:
Originally Posted by philanc
That said, I perfectly understand that
- supporting this sort of environment is not a priority for the Slackware team,
- it may be better for Slackware to either implement all the kit (PAM + Kerberos + deps + pamified/kerberized apps) like all major distros, or else implement nothing, rather than a partial solution.
Actually the implementation of PAM+Kerberos needs less additional packages than PulseAudio. And most of the work has already been done outside the distribution.
A Directory consists of:
- LDAP database that replaces /etc/passwd and /etc/group and optionally other flat files.
- Kerberos database and KDC that replace /etc/shadow.
AD supports several authentication methods:
- kerberos (the most well known these days)
- NTLMv2
- other methods (including the less secure NTLM, digest, down to plain text password)
NTLMv2 over ldaps is a perfectly valid and secure method involving no Kerberos ticket at all (--just a salted and hashed password). It is simple, works with the Windows password for Windows clients, and requires very few components on the target server.
On the other hand, Kerberos is the preferred solution for several reasons:
Technically, it is a solid, secure, proven solution. It provides a good single sign-on solution for users -- once I am logged into my PC, I can access other servers and I am transparently authenticated (no password entry required).
More importantly, it is the de facto standard in corporate environments, because of Microsoft prevalence, but also because it has been adopted and is supported by the majors Linux distros (redhat, suse, debian, ubuntu) in corporate IT.
It means that when you google for "Linux AD authentication", most of what you get is Kerberos-based auth.
For this non-technical reason only, I think that the Slackware team "PAM+Kerberos or nothing" approach is the wise one.
While it indeed is doubtful reviving this thread will be decisive in any way I notice post #299 was marked 5 times while post #300 was marked "helpful" 1 time. So apparently this thread still serves some purpose. I do caution the next posters to first read and understand the whole thread before contributing though: rehashing serves no purpose at all.
What is the Current State of PAM and Slackware (Current)?
Looking for current guidance on the topic of PAM and Slackware, this thread surfaced.
Found the answer in the Changelog for Slackware64-Current.
ref: ftp://ftp.osuosl.org/pub/slackware/s.../ChangeLog.txt
"Fri May 15 07:28:15 UTC 2020
Hey folks, just a heads-up that PAM is about to be merged into the main tree.
We can't have it blocking other upgrades any longer. The config files could be
improved (adding support for pam_krb5 and pam_ldap, for example), but they'll
do for now. Have a good weekend, and enjoy these updates! :-)"
Last edited by linux91; 05-19-2020 at 04:22 PM.
Reason: Resolved the original Question
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.