On Sat, Feb 15, 2014 at 12:14:58AM +0200, Genadi Postrilko wrote: > I have seen threads where opened on trust issues: > "AD - Freeipa trust confusion" > "Cross domain trust" > "Cannot loging via SSH with AD user TO IPA Domain" - which I opened. > > It looks like after creation of trust, TGT ticket can be issued from AD, > but "su" and "ssh" do not allow a log in with AD user. > I'm not sure if a conclusion has been reached on this subject. > > I gave it a try again and attempted to create a trust with IPA as a DNS > subdomain of AD. > I followed : > https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Identity_Management_Guide/trust-ipa-subdomain.html > > AD domain: ADEXAMPLE.COM > IPA subdoamin: LINUX.ADEXAMPLE.COM > > When i finished the necessary steps i attempted to retrieve a TGT from AD > (while logged in to IPA server): > > [root@ipaserver1 sbin]# kinit administra...@adexample.com > Password for administra...@adexample.com: > [root@ipaserver1 sbin]# klist > Ticket cache: FILE:/tmp/krb5cc_0 > Default principal: administra...@adexample.com > > Valid starting Expires Service principal > 02/14/14 07:50:21 02/14/14 17:50:20 krbtgt/adexample....@adexample.com > renew until 02/15/14 07:50:21 > > But logging in by "ssh" and "su" ended in failure: > > login as: administra...@adexample.com > administra...@addc.com@192.168.227.201's password: > Access denied > > After reading > http://www.freeipa.org/page/IPAv3_testing_AD_trust#Create_a_trust_to_an_AD_domaini > did the following on the AD server: > > Administrative Tools -> Active Directory Domains and Trust -> > adexample.com(right click) -> Properties -> Trust -> Domain Trusted by > this domain > (outgoing trust) -> Properties -> General -> Validate > > *After doing this i was able to login via "ssh" and "su" with > "Administrator" **user :* > > login as: administra...@adexample.com > administra...@adexample.com@192.168.227.201's password: > Last login: Wed Feb 12 14:39:49 2014 from 192.168.227.1 > Could not chdir to home directory /home/adexample.com/administrator: No > such file or directory > /usr/bin/xauth: error in locking authority file /home/ > adexample.com/administrator/.Xauthority > -sh-4.1$ > > *But still not able to login with other AD accounts:* > > [root@ipaserver1 sbin]# su gen...@adexample.com > su: user gen...@adexample.com does not exist > > After reading the other threads, ill try and provide as much information as > i can: > > *wbinfo -u does not return values.* > [root@ipaserver1 sbin]# wbinfo -u > [root@ipaserver1 sbin]# > > *wbinfo -u output:* > [root@ipaserver1 sbin]# wbinfo -g > admins > editors > default smb group > ad_users > > *wbinfo --online-status shows ADEXAMPLE is offline* > [root@ipaserver1 ~]# wbinfo --online-status > BUILTIN : online > LINUX : online > ADEXAMPLE : offline > > *getent for Administrator does return value.* > [root@ipaserver1 sbin]# getent passwd administra...@adexample.com > administra...@adexample.com:*:699000500:699000500::/home/ > adexample.com/administrator: > > *getent for other AD users does not return value.* > [root@ipaserver1 sbin]# getent passwd gen...@adexample.com > [root@ipaserver1 sbin]# > > > *System info/configurations:* > > [root@ipaserver1 ~]# cat /etc/redhat-release > Red Hat Enterprise Linux Server release 6.2 Beta (Santiago) > > [root@ipaserver1 sbin]# rpm -qa | grep ipa > ipa-python-3.0.0-37.el6.x86_64 > ipa-client-3.0.0-37.el6.x86_64 > libipa_hbac-python-1.9.2-129.el6.x86_64 > ipa-pki-common-theme-9.0.3-7.el6.noarch > ipa-server-trust-ad-3.0.0-37.el6.x86_64 > libipa_hbac-1.9.2-129.el6.x86_64 > ipa-admintools-3.0.0-37.el6.x86_64 > ipa-server-selinux-3.0.0-37.el6.x86_64 > ipa-pki-ca-theme-9.0.3-7.el6.noarch > ipa-server-3.0.0-37.el6.x86_64 > python-iniparse-0.3.1-2.1.el6.noarch > > [root@ipaserver1 ~]# rpm -qa | grep sssd > sssd-1.9.2-129.el6.x86_64 > sssd-client-1.9.2-129.el6.x86_64 > > [root@ipaserver1 sbin]# rpm -qa | grep samb > samba4-common-4.0.0-60.el6_5.rc4.x86_64 > samba4-winbind-clients-4.0.0-60.el6_5.rc4.x86_64 > samba4-libs-4.0.0-60.el6_5.rc4.x86_64 > samba4-python-4.0.0-60.el6_5.rc4.x86_64 > samba4-4.0.0-60.el6_5.rc4.x86_64 > samba4-client-4.0.0-60.el6_5.rc4.x86_64 > samba4-winbind-4.0.0-60.el6_5.rc4.x86_64
Thank you very much for the detailed report. Looks like you are hit by the 'NT_STATUS_INVALID_PARAMETER_MIX' issue (see log.wb-ADEXAMPLE). We are currently investigating this issue. I you would like to help it would be nice if you can try to downgrade the samba4 packages to the -58 release and see if this works any better for you. Currently I'll try tor reproduce this issue locally and will give you an update as soon as I find anything which might help to get around this issue. bye, Sumit > > *SSSD* > > [root@ipaserver1 ~]# cat /etc/sssd/sssd.conf > [domain/linux.adexample.com] > > cache_credentials = True > krb5_store_password_if_offline = True > ipa_domain = linux.adexample.com > id_provider = ipa > auth_provider = ipa > access_provider = ipa > ipa_hostname = ipaserver1.linux.adexample.com > chpass_provider = ipa > ipa_server = ipaserver1.linux.adexample.com > ldap_tls_cacert = /etc/ipa/ca.crt > subdomains_provider = ipa > debug_level = 6 > [sssd] > services = nss, pam, ssh, pac > config_file_version = 2 > > domains = linux.adexample.com > debug_level = 6 > [nss] > debug_level = 6 > [pam] > debug_level = 6 > [sudo] > debug_level = 6 > [autofs] > debug_level = 6 > [ssh] > debug_level = 6 > [pac] > debug_level = 6 > > *KRB5* > > [root@ipaserver1 ~]# cat /etc/krb5.conf > includedir /var/lib/sss/pubconf/krb5.include.d/ > > [logging] > default = FILE:/var/log/krb5libs.log > kdc = FILE:/var/log/krb5kdc.log > admin_server = FILE:/var/log/kadmind.log > > [libdefaults] > default_realm = LINUX.ADEXAMPLE.COM > dns_lookup_realm = false > dns_lookup_kdc = true > rdns = false > ticket_lifetime = 24h > forwardable = yes > > [realms] > LINUX.ADEXAMPLE.COM = { > kdc = ipaserver1.linux.adexample.com:88 > master_kdc = ipaserver1.linux.adexample.com:88 > admin_server = ipaserver1.linux.adexample.com:749 > default_domain = linux.adexample.com > pkinit_anchors = FILE:/etc/ipa/ca.crt > auth_to_local = RULE:[1:$1@$0](^.*@ADEXAMPLE.COM$)s/@ > ADEXAMPLE.COM/@adexample.com/ > auth_to_local = DEFAULT > } > > [domain_realm] > .linux.adexample.com = LINUX.ADEXAMPLE.COM > linux.adexample.com = LINUX.ADEXAMPLE.COM > > [dbmodules] > LINUX.ADEXAMPLE.COM = { > db_library = ipadb.so > } > > I have increased the debug level of the IPA components. > Here are the logs (*krb5_child.log, **ldap_child.log, **log.smbd, > **log.wb-ADEXAMPLE, > **log.wb-LINUX, **log.winbindd, **log.winbindd-dc-connect, > log.winbindd-idmap*, *sssd.log*, *sssd_linux.adexample.com.log*,*sssd_nss.log, > **sssd_pac.log*, *sssd_pam.log, * > > > > *sssd_ssh.log, /var/log/secure):https://gist.github.com/anonymous/9006532 > <https://gist.github.com/anonymous/9006532>* > Any insights on why only Administrator is recognized by the Trust? And why > extra step on AD was needed? > _______________________________________________ > Freeipa-users mailing list > Freeipa-users@redhat.com > https://www.redhat.com/mailman/listinfo/freeipa-users _______________________________________________ Freeipa-users mailing list Freeipa-users@redhat.com https://www.redhat.com/mailman/listinfo/freeipa-users