How to Rebuild the Kerberos Database


Contents

About This Document
About This Procedure
Procedure

About This Document

The following procedure outlines how to destroy the Kerberos database on the IBM RS/6000 Scalable POWERparallel System and then rebuild it.

This procedure applies to:


About This Procedure

The following list possible reasons for rebuilding the Kerberos database:


Procedure

At the control workstation (CW), log in as root and execute the following commands:

  1. /usr/lpp/ssp/kerberos/bin/kdestroy

    The kdestroy command destroys the user's authentication tickets, which are located in /tmp/tkt<uid>.

  2. /usr/lpp/ssp/kerberos/etc/kdb_destroy

    The kdb_destroy command destroys the kerberos authentication database, which is located in /var/kerberos/*.

  3. rm /etc/krb*

    This removes the following files:

    • krb-srvtab: contains the keys for services on the nodes
    • krb.conf: contains the SP authentication configuration
    • krb.realms: specifies the translations from host names to authentication realms

  4. rm /.klogin

    This removes the .klogin file, which contains a list of principals that are authorized to invoke processes as the root user with the SP-authenticated remote commands [rsh,rcp].

  5. rm /.k

    This removes the Kerberos Master key cache file.

  6. rm /var/kerberos/database/*

    This command insures that the authentication database files are completely removed.

  7. /usr/lpp/ssp/bin/setup_authent

    This command configures SP authentication services. Executing this command invokes an interactive dialog, in which various utility programs are invoked to accomplish this configuration. (Refer to Chapter 1, the "Understanding RS/6000 SP Installation" section of the IBM RISC System/6000 Scalable POWERparallel Systems Installation Guide.)

    NOTE: In PSSP 2.3 and later this step will also perform the actions listed in steps 9 and 10.

  8. /usr/lpp/ssp/bin/hmreinit

    This command will recycle the hardmon daemon and let it get a new hardmon ticket so it can monitor the hardware properly.

    NOTE: if you are running PSSP 2.3 or later you may skip to step 11 after completing step 8.

  9. /usr/lpp/ssp/bin/setup_server

    This command will add the necessary remote command (RCMD) principals for the nodes to the Kerberos database based on what is defined in the SDR for those nodes.

  10. Set the nodes to customize to create the new srvtab files.

    1. Execute the command smitty node_data.
    2. Select BOOT/INSTALL/USR SERVER INFORMATION.
    3. Enter START FRAME, START SLOT, and NODE COUNT or NODE LIST.
    4. Set RESPONSE FROM SERVER TO BOOTP REQUEST to "customize".
    5. Verify that RUN SETUP SERVER ON THE CW is set to "yes".
    6. Press Enter to execute setup_server.

  11. The final step involves propagating the /etc/krb-srvtab files onto the nodes. This can be done automatically or manually as described below.

    AUTOMATICALLY (requires a re-boot of the nodes):

    Shut down and reboot the nodes (DO NOT use netboot).

    MANUALLY (reboot of the nodes is NOT required):

    1. On the CW, cd into the /tftpboot directory and verify that there is a <node_name>-new-srvtab file for each node.

    2. ftp each node's respective /tftpboot/<node-name>-new-srvtab file from the CW to the node and rename the file to /etc/krb-srvtab.

    3. Compare the following files located on the control workstation to those located on the nodes:

      • /etc/krb.realms (may be zero length, but must exist)
      • /etc/krb.conf
      • /.klogin (must be in $HOME for every Kerberos user)

      If they differ, ftp the files from the control workstation out to the nodes.

    4. Set the nodes back to disk via smit node_data on the Control Workstation.

      Once the nodes are customized with the new /etc/krb-srvtab, you can test the functionality of Kerberos by obtaining a ticket (kinit root.admin) and executing the /usr/lpp/ssp/rcmd/bin/rsh <any_node> date command.


    How to Rebuild the Kerberos Database: rebuild.kerberos.4x.sp ITEM: FAX
    Dated: 99/01/26~00:00 Category: sp
    This HTML file was generated 99/06/24~12:42:10
    Comments or suggestions?
    Contact us