TP Kerberos
TP Kerberos
List of Figures 2
List of Tables 3
Introduction 4
0.1 Kerbros Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
0.2 How does it work ? . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1 Setting up 5
1.1 Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.2 Configuring DNS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.3 Time synchronization . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.3.1 Time server . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.3.2 Synchronize machines . . . . . . . . . . . . . . . . . . . . . . . 7
1.4 Configuring KDC[1][2] . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.4.1 Package installation . . . . . . . . . . . . . . . . . . . . . . . . 8
1.4.2 Database creation . . . . . . . . . . . . . . . . . . . . . . . . . 9
1.4.3 Principles creation . . . . . . . . . . . . . . . . . . . . . . . . 9
1.4.4 Server restart . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
1.5 Configuring Client and Service[1][2] . . . . . . . . . . . . . . . . . . . 11
1.5.1 Client configuration . . . . . . . . . . . . . . . . . . . . . . . . 11
1.5.2 Service configuration [3] . . . . . . . . . . . . . . . . . . . . . 11
2 SSH Authentication 12
2.1 User creation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
2.2 SSH authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
2.3 Principal creation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
2.4 OpenSSH Configuration . . . . . . . . . . . . . . . . . . . . . . . . . 12
2.5 SSH authentication without password . . . . . . . . . . . . . . . . . . 13
Conclusion 15
References 16
1
List of Figures
2
List of Tables
3
Introduction
In this report, we will explain how to set up a Kerberos authentication system based
on linux systems. In this system, we will have a Key Distribution Center, a Client
and a Service. The Client will be able to connect to Service using SSH and Kerberos
authentication.
4
Chapter 1
Setting up
In this chapter, we will show how to set up all the machines in order to create a
Kerberos-based authentication system.
1.1 Requirements
In order to create this system, we will need
• At least 3 machines with admin privilege, one for the KDC, one for the client
and one for the service
5
Kerberos Based System
CHAPTER 1. SETTING UP 6
Kerberos Based System
CHAPTER 1. SETTING UP 7
Kerberos Based System
Installation will throw an error because no database will be found. We will create
one in the next sub-section
CHAPTER 1. SETTING UP 8
Kerberos Based System
CHAPTER 1. SETTING UP 9
Kerberos Based System
The last line means ”Give to admin all privileges”, * means all privileges.
CHAPTER 1. SETTING UP 10
Kerberos Based System
CHAPTER 1. SETTING UP 11
Chapter 2
SSH Authentication
12
Kerberos Based System
15
References
[1] https://linuxconfig.org/how-to-install-kerberos-kdc-server-and-client-on-
ubuntu-18-04.
[2] https://www.howtoforge.com/how-to-setup-kerberos-server-and-client-on-
ubuntu-1804-lts.
[4] https://doc.ubuntu-fr.org/ntp.
16