Tuesday, March 25, 2008

Little piggie, little piggie let me in.

I love how BigCorp(tm) think it's a great idea to use a Windows domain controller (ADS/KRB5) to authenticate their Linux users against.

What a marvelous idea! It means we can all have a single password throughout the organization!

It sounds great in a perfect world, where:

  • Networks/interfaces don't fail.
  • Accounts are not locked out when a user attempts to autheticate more than once every 5 seconds (really nasty when attempting to do something like: for i in `cat hosts.txt`; do ssh $i /bin/something; done )
  • Machines and the DC don't always match up time (particularly across large subnets regions/physical locations.

The one that gets me....
  1. Lose connectivity to the subnet that contains the Windows Domain Controllers.
  2. Customer raises issue 'Can't login'.
  3. Customer expects us to 'fix the issue'.
  4. We can't even login (even on the console as root with a local password), as the pam config specifies it needs to check the KRB5 realms.
  5. Customer gets narky.
  6. Customer is aware of the issue, but refuses to acknowledge it as a problem.

The solution... sit it out until hopefully the network comes back. Failing that.. a reboot using the boot option of 'single'. That's if the customer allows you to reboot the machine.

The joys of corporate stupidity. *sigh*

Thursday, March 6, 2008

1+1= ?

16GB of swap space required.

15GB SSD as the only onboard disk.

Are you sure you don't see something wrong with this picture?