On 03/08/2012 05:09 PM, Andres Septer wrote:

Check the winbind log files,

Did that already. Nothing interesting there, only lines like
[2012/03/08 14:32:17.115991,  3] 
winbindd/winbindd_misc.c:417(winbindd_priv_pipe_dir)
   [25675]: request location of privileged pipe
[2012/03/08 14:32:17.117136,  6] 
winbindd/winbindd.c:840(winbind_client_request_read)
   closing socket 26, client exited

and perhaps try using "strace -f -p<freerad.pid>  -o log" to
watch process execution.

I already did that to get the command line. When I run that line manually I get
"login failed". T try to figure out how to capture actual ntlm_auth output from 
within
freerad process. Also, where freeradd gets the values for parameters
  MS-CHAP-Challenge = 0xd50bd065d4215da9
         MS-CHAP-Response = 
0x00010000000000000000000000000000000000000000000000001e7c77d05691cb2822a6670bf0b458e251c4ef170a2c2fff
?
Those seem to be wrong. When I use them manually from command line I get "login 
failed"

If you mean you're taking the value of the challenge & response and passing them straight to ntlm_auth, you can't do that; it doesn't work. There is intermediate processing that is done before calling ntlm_auth.

Maybe the client is broken, but maybe not. What is the client?
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to