Good. Kerberos relies on service principal names (which again relies on 
name resolution), so you need a working DNS infrastructure for Kerberos to 
work correctly.

On Monday, September 7, 2015 at 10:35:15 AM UTC+2, Eyal Zarchi wrote:
>
> Trond - thanks for the tip.
> it actually helped because using tcpdump we saw that we had more than 1 
> PTR records for the server.
> as soon as we fixed that, the winrm worked.
> again it was weird since it did work in the same network but not over vlan.
>
>
>
>
> On Monday, September 7, 2015 at 2:27:53 AM UTC+3, Trond Hindenes wrote:
>>
>> EYal, just a thought: Could you try replacing ip addresses in your hosts 
>> file with actual servername fqdns (sts03.domain.com) and see if that 
>> helps?
>>
>> On Sunday, September 6, 2015 at 1:20:55 PM UTC+2, Eyal Zarchi wrote:
>>>
>>> Hi
>>> the servers are of course in the host file.
>>>
>>> Ok some updates on this but first information:
>>>
>>> Domain controller : 172.16.10.6
>>> Ansible controller - 172.16.19.1
>>> server that works (STS03) - 172.16.19.41
>>> servers that DOESNT work (STS01) - 172.16.1.114
>>>
>>>
>>> now if i try with a domain username to access from ansible to STS03 
>>> (that works), it is all good.
>>> if i try with a domain username to access from ansible to STS01 (doesnt 
>>> work) - i get the "server not found in kerberos database" and "username is 
>>> incorrect"
>>>
>>> now if i take the server that doesnt work and move it to the same 
>>> network (172.16.19.42) near the server that works - everything is working 
>>> on both servers.
>>>
>>> as soon as it is in another vlan, the domain username doesnt work 
>>> anylonger (a local username on the machine works anywhere).
>>>
>>> so i suspected it is maybe something on the dc (in the firewall i have 
>>> ANY to ANY on all 4 servers: DC, ansible , STS01 & STS 03).
>>>
>>> i ran wireshark on the DC and ran against both servers:
>>>
>>> when the ansible runs again the server INSIDE the network (STS03) i see 
>>> this:
>>> 172.16.10.6 172.16.19.41 TCP 66 kerberos > 55200 [SYN, ACK] Seq=0 Ack=1 
>>> Win=8192 Len=0 MSS=1460 WS=256 SACK_PERM=1
>>> 172.16.10.6 172.16.19.41 TCP 54 kerberos > 55200 [RST, ACK] Seq=1441 
>>> Ack=1419 Win=0 Len=0
>>>
>>> so it seems that the DC is working directly against the destination 
>>> server.
>>>
>>>
>>> BUT if i run the same winrm against the server in another VLAN i see 
>>> this:
>>> 172.16.10.6 172.16.12.71 KRB5 176 KRB Error: 
>>> KRB5KDC_ERR_S_PRINCIPAL_UNKNOWN
>>> 172.16.10.6 172.16.12.71 TCP 54 kerberos > 60772 [RST, ACK] Seq=111 
>>> Ack=1441 Win=0 Len=0
>>>
>>>
>>> it seems that when the destination server is in another VLAN, the 
>>> kerberos is checked against the controller machine and not the destination 
>>> server.
>>>
>>>
>>> could i be on to something?
>>>
>>>
>>> On Tuesday, September 1, 2015 at 11:08:41 AM UTC+3, Eyal Zarchi wrote:
>>>>
>>>> Hi.
>>>>
>>>> we have a few windows server 2008 R2 that we would like to use the 
>>>> winrm module.
>>>> we have similar machines that some work and some dont. i compared the 
>>>> build of the machine, the build of the powershell and even local security 
>>>> policy. the result is still the same.
>>>> we use kerberos and winbind on the controller machine and since the 
>>>> winrm module work for windows 2012 and some of the 2008 R2 machines with 
>>>> the domain username, i am guessing the issue is not on the controller.
>>>>
>>>> i though it was because it uses the ticket with the ldap user i logged 
>>>> into the controller machine but i am a member of the administrator group 
>>>> on 
>>>> the target machine and it still doesnt work.
>>>> if i create a local username and put it in the administrator group, the 
>>>> winrm work.
>>>>
>>>> here is a machine that works:
>>>>
>>>> <rnpl-qa1-bes01> WINRM RESULT <Response code 0, out 
>>>> "C:\Users\deploy_rn\A", err "">
>>>> <rnpl-qa1-bes01> PUT /tmp/tmpe8SQvn TO 
>>>> C:\Users\deploy_rn\AppData\Local\Temp\ansible-tmp-1441020926.8-178247757458762\\win_ping
>>>> <rnpl-qa1-bes01> WINRM PUT /tmp/tmpe8SQvn to 
>>>> C:\Users\deploy_rn\AppData\Local\Temp\ansible-tmp-1441020926.8-178247757458762\\win_ping.ps1
>>>>  
>>>> (offset=0 size=2035)
>>>> <rnpl-qa1-bes01> WINRM PUT /tmp/tmpe8SQvn to 
>>>> C:\Users\deploy_rn\AppData\Local\Temp\ansible-tmp-1441020926.8-178247757458762\\win_ping.ps1
>>>>  
>>>> (offset=2035 size=2035)
>>>> <rnpl-qa1-bes01> WINRM PUT /tmp/tmpe8SQvn to 
>>>> C:\Users\deploy_rn\AppData\Local\Temp\ansible-tmp-1441020926.8-178247757458762\\win_ping.ps1
>>>>  
>>>> (offset=4070 size=2035)
>>>> <rnpl-qa1-bes01> WINRM PUT /tmp/tmpe8SQvn to 
>>>> C:\Users\deploy_rn\AppData\Local\Temp\ansible-tmp-1441020926.8-178247757458762\\win_ping.ps1
>>>>  
>>>> (offset=6105 size=602)
>>>> <rnpl-qa1-bes01> PUT /tmp/tmpsiY4YG TO 
>>>> C:\Users\deploy_rn\AppData\Local\Temp\ansible-tmp-1441020926.8-178247757458762\\arguments
>>>> <rnpl-qa1-bes01> WINRM PUT /tmp/tmpsiY4YG to 
>>>> C:\Users\deploy_rn\AppData\Local\Temp\ansible-tmp-1441020926.8-178247757458762\\arguments
>>>>  
>>>> (offset=0 size=2)
>>>> <rnpl-qa1-bes01> EXEC PowerShell -NoProfile -NonInteractive 
>>>> -ExecutionPolicy Unrestricted -File 
>>>> C:\Users\deploy_rn\AppData\Local\Temp\ansible-tmp-1441020926.8-178247757458762\\win_ping.ps1
>>>>  
>>>> C:\Users\deploy_rn\AppData\Local\Temp\ansible-tmp-1441020926.8-178247757458762\\arguments;
>>>>  
>>>> Remove-Item 
>>>> "C:\Users\deploy_rn\AppData\Local\Temp\ansible-tmp-1441020926.8-178247757458762\"
>>>>  
>>>> -Force -Recurse;
>>>> <rnpl-qa1-bes01> WINRM EXEC 'PowerShell' ['-NoProfile', 
>>>> '-NonInteractive', '-EncodedCommand', 
>>>> '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']
>>>> <rnpl-qa1-bes01> WINRM RESULT <Response code 0, out "{ "changed": f", 
>>>> err "">
>>>> rnpl-qa1-bes01 | success >> {
>>>>     "changed": false,
>>>>     "ping": "pong"
>>>> }
>>>>
>>>>
>>>> here is one that doesnt work:
>>>>
>>>> <rnpl-qa1-sts01> ESTABLISH WINRM CONNECTION FOR USER:  on PORT 5986 TO 
>>>> rnpl-qa1-sts01
>>>> <rnpl-qa1-sts02> ESTABLISH WINRM CONNECTION FOR USER:  on PORT 5986 TO 
>>>> rnpl-qa1-sts02
>>>> <rnpl-qa1-sts01> WINRM CONNECT: transport=kerberos endpoint=
>>>> https://rnpl-qa1-sts01:5986/wsman
>>>> <rnpl-qa1-sts02> WINRM CONNECT: transport=kerberos endpoint=
>>>> https://rnpl-qa1-sts02:5986/wsman
>>>> rnpl-qa1-sts01 | FAILED => the username/password specified for this 
>>>> server was incorrect
>>>> rnpl-qa1-sts02 | FAILED => the username/password specified for this 
>>>> server was incorrect
>>>>
>>>>
>>>> as soon as i remove the @DOMAIN from the host file, and use a local 
>>>> username, the winrm works.
>>>> i am probably missing a silly thing but i cant find it.
>>>> thanks
>>>>
>>>

-- 
You received this message because you are subscribed to the Google Groups 
"Ansible Project" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/ansible-project/b219ecf4-3a8b-4aa2-aa77-b8628be47f51%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to