Linux and Windows: a Tale of Kerberos, Sssd, Dfs, and Black Magic (2018)
Posted2 months agoActive2 months ago
draeath.netTechstory
calmmixed
Debate
20/100
KerberosSssdDfsLinux-Windows Integration
Key topics
Kerberos
Sssd
Dfs
Linux-Windows Integration
The post details the author's journey in setting up Kerberos, SSSD, and DFS on Linux and Windows systems, while the discussion revolves around the challenges and workarounds for similar integrations.
Snapshot generated from the HN discussion
Discussion Activity
Light discussionFirst comment
5h
Peak period
3
18-21h
Avg / period
1.3
Key moments
- 01Story posted
Nov 1, 2025 at 8:54 PM EDT
2 months ago
Step 01 - 02First comment
Nov 2, 2025 at 1:03 AM EST
5h after posting
Step 02 - 03Peak activity
3 comments in 18-21h
Hottest window of the conversation
Step 03 - 04Latest activity
Nov 3, 2025 at 11:07 AM EST
2 months ago
Step 04
Generating AI Summary...
Analyzing up to 500 comments to identify key contributors and discussion patterns
ID: 45786962Type: storyLast synced: 11/20/2025, 1:30:03 PM
Want the full context?
Jump to the original sources
Read the primary article or dive into the live Hacker News thread when you're ready.
Never had an issue with this.
"name: initialize Kerberos ticket"
What's the use case for this Ansible task. Never had a need to manually generate tickets.
edit: didn't read it through; this is part of their automation pipeline
--
We manage 1000+ Windows Servers with Ansible and it's been as simple as Linux SSH. Multiple SOCKS5 proxies to different AD forests, WinRM double hop works great when become:true, GPO works just fine on Linux, initial setup is very simple with realmd. Biggest manual task is setting up the service accounts for Ansible.
https://web.mit.edu/kerberos/www/krb5-latest/doc/admin/realm...
Amazon open sourced a project trying to solve similar problems.
https://github.com/aws/credentials-fetcher
Nifty, but was clearly made with AWS assumptions and we had to roll our own with the various hooks we needed for our cloud infra.
It would be great if Linux had a mechanism where the host itself could act as the principal to retrieve the gMSA like on Windows but the GSSAPI worker model just works differently there and runs in process. A similar problem exists for using Kerberos FAST/armouring where Windows uses the hosts' ticket to wrap the client request but on Linux there is no privileged worker process that protects this ticket so the client needs to have full access to it.
The closest thing I've seen is gssproxy [1] which tries to solve the problem where you want to protect host secrets from a client actually seeing the secrets but can still use them but I've not seen anything from there to support gMSAs for armouring for client TGT requests.
[1] https://github.com/gssapi/gssproxy
I couldn't figure out yet, whether there is a reasonable and safe way to authenticate at an AD inside a GitHub Action. Anyone done that?