> On 17. Feb 2025, at 19:23, NoSense via illumos-discuss 
> <discuss@lists.illumos.org> wrote:
> 
> Thomas, thanks for the ideas. 
> 
> Yes, sync and npt are running and all systems in the network are using the 
> same local ntp server which is sync'd externally.
> 
> Yes, NTLM is blocked on the DC only but not on the workstation that was 
> accessing the SMB server in the network trace above. This is to force the SMB 
> server to use Kerberos for authentication since I can't seem to disable NTLM 
> on the SMB server. This in turn forces the workstation to ramp up to Kerberos 
> from NTLM as seen in the negotiation with the SMB server. That all seems to 
> go well and they both agree to use Kerberos. 
> 
> As for the login @REALM issue, this is a login on windows machine (not 
> Android) with a domain account. no matter which syntax you login with the 
> SAMAccountName is always what is presented to the SMB server. 
> 
> Right now, I think the issue might be that none of the AD users have 
> individually defined rights to the file shares. They are all defined by AD 
> Groups the user belongs to.  Howerver, idmap dump -n shows the GIDs for all 
> the wingroups and works perfectly when using NTLMv2. Is the Kerberos lookup 
> failing the group lookup and denying access to the resource?
> 
> Under Kerberos is it not able to figure that out? How do I get more detailed 
> logs on the SMB server side?
> 

Well, the error code itself is suggesting that the server knows about the 
policy, but as I noted, on very quick check I was not able to find the relevant 
bit in code.

log is in /var/svc/log/network-smb-server:default.log and smbd also does syslog 
as daemon.level, so you want to set up syslog with daemon.debug or like…

rgds,
toomas
------------------------------------------
illumos: illumos-discuss
Permalink: 
https://illumos.topicbox.com/groups/discuss/Tef371e0d901b265f-M4ca2e4ce7ddb02af3f5ba852
Delivery options: https://illumos.topicbox.com/groups/discuss/subscription

Reply via email to