This line diffs:
AllowUnencrypted = false
That setting basically dictates wether you're allowed to use basic auth
using non-encrypted comms.
Again, from another windows node could you ensure that you're able to
connect to the problematic server using basic auth? Try both with and
without the -usessl parameter and compare to a working node. I suspect you
will find some diffs.
In general we advise using 5986 (SSL) with Ansible.
On Thursday, October 8, 2015 at 3:49:11 PM UTC+2, Eyal Zarchi wrote:
>
> yes that works.
> from one machine to another with ps-remotesession i had no problem.
> even with the domain username and password i was able to connect.
> this happens to all the windows machine in the domain.
> beside the powershell script to prepare for ansible i tried to add the
> security permission for the user but it still doesnt work.
>
> the winrm is ready since i am able to connect with a local username that
> is in the administrators group.
>
> i already got a few windows machine to work with the domain username so i
> am probably just missing something
> this is from a machine that works:
>
> PS C:\Users\TEMP.JAJAH> winrm get winrm/config/service
> Service
> RootSDDL =
> O:NSG:BAD:P(A;;GA;;;BA)(A;;GWGR;;;S-1-5-21-1738876665-1027346198-3318579073-26131)(A;;GR;;;IU)S:P(AU;FA;G
> A;;;WD)(AU;SA;GXGW;;;WD)
> MaxConcurrentOperations = 4294967295
> MaxConcurrentOperationsPerUser = 1500
> EnumerationTimeoutms = 240000
> MaxConnections = 300
> MaxPacketRetrievalTimeSeconds = 120
> AllowUnencrypted = true
> Auth
> Basic = true
> Kerberos = true
> Negotiate = true
> Certificate = false
> CredSSP = false
> CbtHardeningLevel = Relaxed
> DefaultPorts
> HTTP = 5985
> HTTPS = 5986
> IPv4Filter = *
> IPv6Filter = *
> EnableCompatibilityHttpListener = false
> EnableCompatibilityHttpsListener = false
> CertificateThumbprint
> AllowRemoteAccess = true
>
>
> this is from a machine that doesnt work:
> Service
> RootSDDL =
> O:NSG:BAD:P(A;;GA;;;BA)(A;;GR;;;IU)S:P(AU;FA;GA;;;WD)(AU;SA;GXGW;;;WD)
> MaxConcurrentOperations = 4294967295
> MaxConcurrentOperationsPerUser = 1500
> EnumerationTimeoutms = 240000
> MaxConnections = 300
> MaxPacketRetrievalTimeSeconds = 120
> AllowUnencrypted = false
> Auth
> Basic = true
> Kerberos = true
> Negotiate = true
> Certificate = false
> CredSSP = false
> CbtHardeningLevel = Relaxed
> DefaultPorts
> HTTP = 5985
> HTTPS = 5986
> IPv4Filter = *
> IPv6Filter = *
> EnableCompatibilityHttpListener = false
> EnableCompatibilityHttpsListener = false
> CertificateThumbprint = eb 9b 2d f2 a5 89 03 f2 e2 ca 0e 8a 35 32 39
> 08c5 a8 42 d7
> AllowRemoteAccess = true
>
>
>
> On Thursday, October 8, 2015 at 4:17:25 PM UTC+3, Trond Hindenes wrote:
>>
>> Could you test regular ps remoting from another domain-joined windows
>> node against the problematic servers to see if that works?
>>
>> On Thursday, October 8, 2015 at 3:04:00 PM UTC+2, Eyal Zarchi wrote:
>>>
>>> Hi again.
>>> well after removing all extra PTR the servers where good to do.
>>> i started deploying the ansible on production servers and here i have
>>> the same issue exactly but this time the dns and resolve are correct.
>>> local user on the machine is working perfectly
>>> domain user will produce the "
>>> FAILED => the username/password specified for this server was incorrect"
>>> error message.
>>>
>>> is there any logs i can check or extra errors i can check?
>>> thanks
>>>
>>> On Monday, September 7, 2015 at 5:51:13 PM UTC+3, Trond Hindenes wrote:
>>>>
>>>> Good. Kerberos relies on service principal names (which again relies on
>>>> name resolution), so you need a working DNS infrastructure for Kerberos to
>>>> work correctly.
>>>>
>>>> On Monday, September 7, 2015 at 10:35:15 AM UTC+2, Eyal Zarchi wrote:
>>>>>
>>>>> Trond - thanks for the tip.
>>>>> it actually helped because using tcpdump we saw that we had more than
>>>>> 1 PTR records for the server.
>>>>> as soon as we fixed that, the winrm worked.
>>>>> again it was weird since it did work in the same network but not over
>>>>> vlan.
>>>>>
>>>>>
>>>>>
>>>>>
>>>>> On Monday, September 7, 2015 at 2:27:53 AM UTC+3, Trond Hindenes wrote:
>>>>>>
>>>>>> EYal, just a thought: Could you try replacing ip addresses in your
>>>>>> hosts file with actual servername fqdns (sts03.domain.com) and see
>>>>>> if that helps?
>>>>>>
>>>>>> On Sunday, September 6, 2015 at 1:20:55 PM UTC+2, Eyal Zarchi wrote:
>>>>>>>
>>>>>>> Hi
>>>>>>> the servers are of course in the host file.
>>>>>>>
>>>>>>> Ok some updates on this but first information:
>>>>>>>
>>>>>>> Domain controller : 172.16.10.6
>>>>>>> Ansible controller - 172.16.19.1
>>>>>>> server that works (STS03) - 172.16.19.41
>>>>>>> servers that DOESNT work (STS01) - 172.16.1.114
>>>>>>>
>>>>>>>
>>>>>>> now if i try with a domain username to access from ansible to STS03
>>>>>>> (that works), it is all good.
>>>>>>> if i try with a domain username to access from ansible to STS01
>>>>>>> (doesnt work) - i get the "server not found in kerberos database" and
>>>>>>> "username is incorrect"
>>>>>>>
>>>>>>> now if i take the server that doesnt work and move it to the same
>>>>>>> network (172.16.19.42) near the server that works - everything is
>>>>>>> working
>>>>>>> on both servers.
>>>>>>>
>>>>>>> as soon as it is in another vlan, the domain username doesnt work
>>>>>>> anylonger (a local username on the machine works anywhere).
>>>>>>>
>>>>>>> so i suspected it is maybe something on the dc (in the firewall i
>>>>>>> have ANY to ANY on all 4 servers: DC, ansible , STS01 & STS 03).
>>>>>>>
>>>>>>> i ran wireshark on the DC and ran against both servers:
>>>>>>>
>>>>>>> when the ansible runs again the server INSIDE the network (STS03) i
>>>>>>> see this:
>>>>>>> 172.16.10.6 172.16.19.41 TCP 66 kerberos > 55200 [SYN, ACK] Seq=0
>>>>>>> Ack=1 Win=8192 Len=0 MSS=1460 WS=256 SACK_PERM=1
>>>>>>> 172.16.10.6 172.16.19.41 TCP 54 kerberos > 55200 [RST, ACK]
>>>>>>> Seq=1441 Ack=1419 Win=0 Len=0
>>>>>>>
>>>>>>> so it seems that the DC is working directly against the destination
>>>>>>> server.
>>>>>>>
>>>>>>>
>>>>>>> BUT if i run the same winrm against the server in another VLAN i see
>>>>>>> this:
>>>>>>> 172.16.10.6 172.16.12.71 KRB5 176 KRB Error:
>>>>>>> KRB5KDC_ERR_S_PRINCIPAL_UNKNOWN
>>>>>>> 172.16.10.6 172.16.12.71 TCP 54 kerberos > 60772 [RST, ACK] Seq=111
>>>>>>> Ack=1441 Win=0 Len=0
>>>>>>>
>>>>>>>
>>>>>>> it seems that when the destination server is in another VLAN, the
>>>>>>> kerberos is checked against the controller machine and not the
>>>>>>> destination
>>>>>>> server.
>>>>>>>
>>>>>>>
>>>>>>> could i be on to something?
>>>>>>>
>>>>>>>
>>>>>>> On Tuesday, September 1, 2015 at 11:08:41 AM UTC+3, Eyal Zarchi
>>>>>>> wrote:
>>>>>>>>
>>>>>>>> Hi.
>>>>>>>>
>>>>>>>> we have a few windows server 2008 R2 that we would like to use the
>>>>>>>> winrm module.
>>>>>>>> we have similar machines that some work and some dont. i compared
>>>>>>>> the build of the machine, the build of the powershell and even local
>>>>>>>> security policy. the result is still the same.
>>>>>>>> we use kerberos and winbind on the controller machine and since the
>>>>>>>> winrm module work for windows 2012 and some of the 2008 R2 machines
>>>>>>>> with
>>>>>>>> the domain username, i am guessing the issue is not on the controller.
>>>>>>>>
>>>>>>>> i though it was because it uses the ticket with the ldap user i
>>>>>>>> logged into the controller machine but i am a member of the
>>>>>>>> administrator
>>>>>>>> group on the target machine and it still doesnt work.
>>>>>>>> if i create a local username and put it in the administrator group,
>>>>>>>> the winrm work.
>>>>>>>>
>>>>>>>> here is a machine that works:
>>>>>>>>
>>>>>>>> <rnpl-qa1-bes01> WINRM RESULT <Response code 0, out
>>>>>>>> "C:\Users\deploy_rn\A", err "">
>>>>>>>> <rnpl-qa1-bes01> PUT /tmp/tmpe8SQvn TO
>>>>>>>> C:\Users\deploy_rn\AppData\Local\Temp\ansible-tmp-1441020926.8-178247757458762\\win_ping
>>>>>>>> <rnpl-qa1-bes01> WINRM PUT /tmp/tmpe8SQvn to
>>>>>>>> C:\Users\deploy_rn\AppData\Local\Temp\ansible-tmp-1441020926.8-178247757458762\\win_ping.ps1
>>>>>>>>
>>>>>>>> (offset=0 size=2035)
>>>>>>>> <rnpl-qa1-bes01> WINRM PUT /tmp/tmpe8SQvn to
>>>>>>>> C:\Users\deploy_rn\AppData\Local\Temp\ansible-tmp-1441020926.8-178247757458762\\win_ping.ps1
>>>>>>>>
>>>>>>>> (offset=2035 size=2035)
>>>>>>>> <rnpl-qa1-bes01> WINRM PUT /tmp/tmpe8SQvn to
>>>>>>>> C:\Users\deploy_rn\AppData\Local\Temp\ansible-tmp-1441020926.8-178247757458762\\win_ping.ps1
>>>>>>>>
>>>>>>>> (offset=4070 size=2035)
>>>>>>>> <rnpl-qa1-bes01> WINRM PUT /tmp/tmpe8SQvn to
>>>>>>>> C:\Users\deploy_rn\AppData\Local\Temp\ansible-tmp-1441020926.8-178247757458762\\win_ping.ps1
>>>>>>>>
>>>>>>>> (offset=6105 size=602)
>>>>>>>> <rnpl-qa1-bes01> PUT /tmp/tmpsiY4YG TO
>>>>>>>> C:\Users\deploy_rn\AppData\Local\Temp\ansible-tmp-1441020926.8-178247757458762\\arguments
>>>>>>>> <rnpl-qa1-bes01> WINRM PUT /tmp/tmpsiY4YG to
>>>>>>>> C:\Users\deploy_rn\AppData\Local\Temp\ansible-tmp-1441020926.8-178247757458762\\arguments
>>>>>>>>
>>>>>>>> (offset=0 size=2)
>>>>>>>> <rnpl-qa1-bes01> EXEC PowerShell -NoProfile -NonInteractive
>>>>>>>> -ExecutionPolicy Unrestricted -File
>>>>>>>> C:\Users\deploy_rn\AppData\Local\Temp\ansible-tmp-1441020926.8-178247757458762\\win_ping.ps1
>>>>>>>>
>>>>>>>> C:\Users\deploy_rn\AppData\Local\Temp\ansible-tmp-1441020926.8-178247757458762\\arguments;
>>>>>>>>
>>>>>>>> Remove-Item
>>>>>>>> "C:\Users\deploy_rn\AppData\Local\Temp\ansible-tmp-1441020926.8-178247757458762\"
>>>>>>>>
>>>>>>>> -Force -Recurse;
>>>>>>>> <rnpl-qa1-bes01> WINRM EXEC 'PowerShell' ['-NoProfile',
>>>>>>>> '-NonInteractive', '-EncodedCommand',
>>>>>>>> 'UABvAHcAZQByAFMAaABlAGwAbAAgAC0ATgBvAFAAcgBvAGYAaQBsAGUAIAAtAE4AbwBuAEkAbgB0AGUAcgBhAGMAdABpAHYAZQAgAC0ARQB4AGUAYwB1AHQAaQBvAG4AUABvAGwAaQBjAHkAIABVAG4AcgBlAHMAdAByAGkAYwB0AGUAZAAgAC0ARgBpAGwAZQAgAEMAOgBcAFUAcwBlAHIAcwBcAGQAZQBwAGwAbwB5AF8AcgBuAFwAQQBwAHAARABhAHQAYQBcAEwAbwBjAGEAbABcAFQAZQBtAHAAXABhAG4AcwBpAGIAbABlAC0AdABtAHAALQAxADQANAAxADAAMgAwADkAMgA2AC4AOAAtADEANwA4ADIANAA3ADcANQA3ADQANQA4ADcANgAyAFwAXAB3AGkAbgBfAHAAaQBuAGcALgBwAHMAMQAgAEMAOgBcAFUAcwBlAHIAcwBcAGQAZQBwAGwAbwB5AF8AcgBuAFwAQQBwAHAARABhAHQAYQBcAEwAbwBjAGEAbABcAFQAZQBtAHAAXABhAG4AcwBpAGIAbABlAC0AdABtAHAALQAxADQANAAxADAAMgAwADkAMgA2AC4AOAAtADEANwA4ADIANAA3ADcANQA3ADQANQA4ADcANgAyAFwAXABhAHIAZwB1AG0AZQBuAHQAcwA7ACAAUgBlAG0AbwB2AGUALQBJAHQAZQBtACAAIgBDADoAXABVAHMAZQByAHMAXABkAGUAcABsAG8AeQBfAHIAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAXABUAGUAbQBwAFwAYQBuAHMAaQBiAGwAZQAtAHQAbQBwAC0AMQA0ADQAMQAwADIAMAA5ADIANgAuADgALQAxADcAOAAyADQANwA3ADUANwA0ADUAOAA3ADYAMgBcACIAIAAtAEYAbwByAGMAZQAgAC0AUgBlAGMAdQByAHMAZQA7AA==']
>>>>>>>> <rnpl-qa1-bes01> WINRM RESULT <Response code 0, out "{ "changed":
>>>>>>>> f", err "">
>>>>>>>> rnpl-qa1-bes01 | success >> {
>>>>>>>> "changed": false,
>>>>>>>> "ping": "pong"
>>>>>>>> }
>>>>>>>>
>>>>>>>>
>>>>>>>> here is one that doesnt work:
>>>>>>>>
>>>>>>>> <rnpl-qa1-sts01> ESTABLISH WINRM CONNECTION FOR USER: on PORT 5986
>>>>>>>> TO rnpl-qa1-sts01
>>>>>>>> <rnpl-qa1-sts02> ESTABLISH WINRM CONNECTION FOR USER: on PORT 5986
>>>>>>>> TO rnpl-qa1-sts02
>>>>>>>> <rnpl-qa1-sts01> WINRM CONNECT: transport=kerberos endpoint=
>>>>>>>> https://rnpl-qa1-sts01:5986/wsman
>>>>>>>> <rnpl-qa1-sts02> WINRM CONNECT: transport=kerberos endpoint=
>>>>>>>> https://rnpl-qa1-sts02:5986/wsman
>>>>>>>> rnpl-qa1-sts01 | FAILED => the username/password specified for this
>>>>>>>> server was incorrect
>>>>>>>> rnpl-qa1-sts02 | FAILED => the username/password specified for this
>>>>>>>> server was incorrect
>>>>>>>>
>>>>>>>>
>>>>>>>> as soon as i remove the @DOMAIN from the host file, and use a local
>>>>>>>> username, the winrm works.
>>>>>>>> i am probably missing a silly thing but i cant find it.
>>>>>>>> thanks
>>>>>>>>
>>>>>>>
--
You received this message because you are subscribed to the Google Groups
"Ansible Project" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
To post to this group, send email to [email protected].
To view this discussion on the web visit
https://groups.google.com/d/msgid/ansible-project/96d4bfa2-714f-4859-9bdf-2505b66e0c75%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.