X-Git-Url: https://pere.pagekite.me/gitweb/homepage.git/blobdiff_plain/fda196f937299486eb9daa1888f92ad1f64d6963..7378da40a732b6d4d5af44865b2c8fd51246964a:/blog/index.rss diff --git a/blog/index.rss b/blog/index.rss index 82128d824c..c899898782 100644 --- a/blog/index.rss +++ b/blog/index.rss @@ -6,6 +6,66 @@ http://people.skolelinux.org/pere/blog/ + + Autodetecting Client setup for roaming workstations in Debian Edu + http://people.skolelinux.org/pere/blog/Autodetecting_Client_setup_for_roaming_workstations_in_Debian_Edu.html + http://people.skolelinux.org/pere/blog/Autodetecting_Client_setup_for_roaming_workstations_in_Debian_Edu.html + Sat, 7 Aug 2010 14:45:00 +0200 + +<p>A few days ago, I +<a href="http://people.skolelinux.org/pere/blog/Debian_Edu_roaming_workstation___at_the_university_of_Oslo.html">tried +to install</a> a Roaming workation profile from Debian Edu/Squeeze +while on the university network here at the University of Oslo, and +noticed how much had to change to get it operational using the +university infrastructure. It was fairly easy, but it occured to me +that Debian Edu would improve a lot if I could get the client to +connect without any changes at all, and thus let the client configure +itself during installation and first boot to use the infrastructure +around it. Now I am a huge step further along that road.</p> + +<p>With our current squeeze-test packages, I can select the roaming +workstation profile and get a working laptop connecting to the +university LDAP server for user and group and our active directory +servers for Kerberos authentication. All this without any +configuration at all during installation. My users home directory got +a bookmark in the KDE menu to mount it via SMB, with the correct URL. +In short, openldap and sssd is correctly configured. In addition to +this, the client look for http://wpad/wpad.dat to configure a web +proxy, and when it fail to find it no proxy settings are stored in +/etc/environment and /etc/apt/apt.conf. Iceweasel and KDE is +configured to look for the same wpad configuration and also do not use +a proxy when at the university network. If the machine is moved to a +network with such wpad setup, it would automatically use it when DHCP +gave it a IP address.</p> + +<p>The LDAP server is located using DNS, by first looking for the DNS +entry ldap.$domain. If this do not exist, it look for the +_ldap._tcp.$domain SRV records and use the first one as the LDAP +server. Next, it connects to the LDAP server and search all +namingContexts entries for posixAccount or posixGroup objects, and +pick the first one as the LDAP base. For Kerberos, a similar +algorithm is used to locate the LDAP server, and the realm is the +uppercase version of $domain.</p> + +<p>So, what is not working, you might ask. SMB mounting my home +directory do not work. No idea why, but suspected the incorrect +Kerberos settings in /etc/krb5.conf and /etc/samba/smb.conf might be +the cause. These are not properly configured during installation, and +had to be hand-edited to get the correct Kerberos realm and server, +but SMB mounting still do not work. :(</p> + +<p>With this automatic configuration in place, I expect a Debian Edu +roaming profile installation would be able to automatically detect and +connect to any site using LDAP and Kerberos for NSS directory and PAM +authentication. It should also work out of the box in a Active +Directory environment providing posixAccount and posixGroup objects +with UID and GID values.</p> + +<p>If you want to help out with implementing these things for Debian +Edu, please contact us on debian-edu@lists.debian.org.</p> + + + Debian Edu roaming workstation - at the university of Oslo http://people.skolelinux.org/pere/blog/Debian_Edu_roaming_workstation___at_the_university_of_Oslo.html @@ -792,28 +852,5 @@ personal home page over at redhat.com.</p> - - jXplorer, a very nice LDAP GUI - http://people.skolelinux.org/pere/blog/jXplorer__a_very_nice_LDAP_GUI.html - http://people.skolelinux.org/pere/blog/jXplorer__a_very_nice_LDAP_GUI.html - Fri, 9 Jul 2010 12:55:00 +0200 - -<p>Since -<a href="http://people.skolelinux.org/pere/blog/LUMA__a_very_nice_LDAP_GUI.html">my -last post</a> about available LDAP tools in Debian, I was told about a -LDAP GUI that is even better than luma. The java application -<a href="http://jxplorer.org/">jXplorer</a> is claimed to be capable of -moving LDAP objects and subtrees using drag-and-drop, and can -authenticate using Kerberos. I have only tested the Kerberos -authentication, but do not have a LDAP setup allowing me to rewrite -LDAP with my test user yet. It is -<a href="http://packages.qa.debian.org/j/jxplorer.html">available in -Debian</a> testing and unstable at the moment. The only problem I -have with it is how it handle errors. If something go wrong, its -non-intuitive behaviour require me to go through some query work list -and remove the failing query. Nothing big, but very annoying.</p> - - -