Yes, the users and computers are all in the same domain (as 
with the servers).  I did attempt to stick the laptop in an OU that has policy 
inheritance blocked.

                Ntlm as user succeeds:
-bash-4.1$ ntlm_auth --username=stormont
password:
NT_STATUS_OK: Success (0x0)
-bash-4.1$ ntlm_auth --username=zzhoppy
password:
NT_STATUS_OK: Success (0x0)
-bash-4.1$

                And from log.winbindd (during interactive user authentication 
listed above)
[2014/08/13 12:48:11.379309,  3] 
winbindd/winbindd_misc.c:384(winbindd_interface_version)
  [38847]: request interface version
[2014/08/13 12:48:11.379440,  3] 
winbindd/winbindd_misc.c:417(winbindd_priv_pipe_dir)
  [38847]: request location of privileged pipe
[2014/08/13 12:48:11.379608,  3] 
winbindd/winbindd_misc.c:394(winbindd_domain_name)
  [38847]: request domain name
[2014/08/13 12:48:15.921652,  3] winbindd/winbindd_misc.c:372(winbindd_info)
  [38847]: request misc info
[2014/08/13 12:48:15.921795,  3] 
winbindd/winbindd_pam_auth.c:54(winbindd_pam_auth_send)
  [38847]: pam auth OMNI\stormont
[2014/08/13 12:48:26.815876,  3] 
winbindd/winbindd_misc.c:384(winbindd_interface_version)
  [38848]: request interface version
[2014/08/13 12:48:26.816002,  3] 
winbindd/winbindd_misc.c:417(winbindd_priv_pipe_dir)
  [38848]: request location of privileged pipe
[2014/08/13 12:48:26.816106,  3] 
winbindd/winbindd_misc.c:394(winbindd_domain_name)
  [38848]: request domain name
[2014/08/13 12:48:31.267636,  3] winbindd/winbindd_misc.c:372(winbindd_info)
  [38848]: request misc info
[2014/08/13 12:48:31.267793,  3] 
winbindd/winbindd_pam_auth.c:54(winbindd_pam_auth_send)
  [38848]: pam auth OMNI\zzhoppy


Ntlm as machine still fails:
[root@pfcv logs]# ntlm_auth  --username=LT-T430-3\$ 
--challenge=4ab096b446376d5f 
--ntresponse=4df85dd62db46ee5bef1aa07fe499e87fc16eca72bd529e7
Logon failure (0xc000006d)

                Below is log.winbindd from when the laptop attempted machine 
auth:
[2014/08/13 13:37:43.894898,  3] 
winbindd/winbindd_misc.c:384(winbindd_interface_version)
  [38912]: request interface version
[2014/08/13 13:37:43.895143,  3] 
winbindd/winbindd_misc.c:417(winbindd_priv_pipe_dir)
  [38912]: request location of privileged pipe
[2014/08/13 13:37:43.895372,  3] 
winbindd/winbindd_misc.c:394(winbindd_domain_name)
  [38912]: request domain name
[2014/08/13 13:37:43.895587,  3] 
winbindd/winbindd_pam_auth_crap.c:56(winbindd_pam_auth_crap_send)
  [38912]: pam auth crap domain: [OMNI] user: LT-T430-3$


From: Louis Munro [mailto:[email protected]]
Sent: Wednesday, August 13, 2014 9:49 AM
To: [email protected]
Subject: Re: [PacketFence-users] "No trusted SAM account"

On 2014-08-12, at 15:58 , "Stormont, Stephen (IMS)" 
<[email protected]<mailto:[email protected]>> wrote:


When I entered the command that you suggested on the PacketFence/FreeRadius 
server, I got this:

[root@pfcv sbin]# ntlm_auth  --username=LT-T430-3\$ 
--challenge=4ab096b446376d5f 
--ntresponse=4df85dd62db46ee5bef1aa07fe499e87fc16eca72bd529e7
Logon failure (0xc000006d)

Contents of mschp are below:

mschap {
        use_mppe = yes
        require_encryption = yes
        require_strong = yes
        with_ntdomain_hack = yes
        ntlm_auth = "/usr/bin/ntlm_auth --request-nt-key 
--username=%{%{Stripped-User-Name}:-%{mschap:User-Name:-None}} 
--challenge=%{mschap:Challenge:-00} --ntresponse=%{mschap:NT-Response:-00}"
}

Well, at least you can reproduce it reliably...

Your mschap file looks about right.
So I think the first step is to get user authentication working reliably.
It's probably easier to figure out why user auth is not working first since 
it's easier to know if your password is correct.

What happens when you try user auth at the command line using ntlm_auth?

I.e.
# ntlm_auth --username=whatever

And if we compare with the FreeRADIUS debugging output for the same section?
Can you post the relevant lines for that please (same ones as for the computer 
authentication)?

What happens when you try to authenticate a user with the same arguments to 
ntlm_auth that FreeRadius uses (just as for the computer auth)?

If user authentication works when you enter the password manually but not when 
freeradius tries it, then either the 802.1x client is not using a valid 
password or the AD cannot find that user.

See this article for some background on ntlm: 
http://msdn.microsoft.com/en-ca/library/windows/desktop/aa378749(v=vs.85).aspx


Have a look at the winbind logs (/var/log/samba/log.winbindd ).
There should be a line for each authentication attempt like the following:

[2014/08/13 09:31:56.156551,  3] 
winbindd/winbindd_pam_auth.c:54(winbindd_pam_auth_send)
  [ 7023]: pam auth inverse.local\lmunro

How does the line differ between when you are authentication manually (from the 
command line) as opposed to when FreeRadius calls winbind (and fails)?
Is the domain the same?


Of course it may help if you have some logs from the AD side as well.

Regards,
--
Louis Munro
[email protected]<mailto:[email protected]>  ::  
www.inverse.ca<http://www.inverse.ca>
+1.514.447.4918 *125  :: +1 (866) 353-6153
Inverse inc. :: Leaders behind SOGo (www.sogo.nu<http://www.sogo.nu>) and 
PacketFence (www.packetfence.org<http://www.packetfence.org>)

________________________________

Information in this e-mail may be confidential. It is intended only for the 
addressee(s) identified above. If you are not the addressee(s), or an employee 
or agent of the addressee(s), please note that any dissemination, distribution, 
or copying of this communication is strictly prohibited. If you have received 
this e-mail in error, please notify the sender of the error.
------------------------------------------------------------------------------
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to