Thomas, thanks for the ideas. 

Yes, sync and npt are running and all systems in the network are using the same 
local ntp server which is sync'd externally.

Yes, NTLM is blocked on the DC only but not on the workstation that was 
accessing the SMB server in the network trace above. This is to force the SMB 
server to use Kerberos for authentication since I can't seem to disable NTLM on 
the SMB server. This in turn forces the workstation to ramp up to Kerberos from 
NTLM as seen in the negotiation with the SMB server. That all seems to go well 
and they both agree to use Kerberos. 

As for the login @REALM issue, this is a login on windows machine (not Android) 
with a domain account. no matter which syntax you login with the SAMAccountName 
is always what is presented to the SMB server. 

Right now, I think the issue might be that none of the AD users have 
individually defined rights to the file shares. They are all defined by AD 
Groups the user belongs to.  Howerver, idmap dump -n shows the GIDs for all the 
wingroups and works perfectly when using NTLMv2. Is the Kerberos lookup failing 
the group lookup and denying access to the resource?

Under Kerberos is it not able to figure that out? How do I get more detailed 
logs on the SMB server side?

So close but not quite there!
------------------------------------------
illumos: illumos-discuss
Permalink: 
https://illumos.topicbox.com/groups/discuss/Tef371e0d901b265f-M800f241f508720b9bc725bb2
Delivery options: https://illumos.topicbox.com/groups/discuss/subscription

Reply via email to