Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
I am trying to get authentication against AD using Winbind and Samba 3. We use Kerberos 5 as well. I know that winbind is running properly because when I run wbinfo -a, I get success messages. The problem seems to be when I try to play with the pam modules. For kicks, here is the pam module for sshd:
The frustrating thing is that nothing shows up in the logs. SInce the auth is set to sufficient above, I can still use the service using my local credentials. This shows up in the logfiles...it shows the pam_winbind failing while the pam_unix2 succeeding. But when I try to use the service with DOMAIN+username, nothing shows up in the logs. All I get is a permission denied when I try to use the service.
I don't know if this problem could be related to the fact that we are using Krb and the PDC might not be configured for that???? I am not familiar with the specifics of everything yet. Any ideas?? Any help is much appreciated.
Distribution: Slack 8.1, Gentoo 1.3a, Red Hat 7.3, Red Hat 7.2, Manrake 8.2
Posts: 328
Rep:
Im not familiar with the setup your discussing as such, but as nobody has replied to you I'll try to oofer some help (if I can).
You say your using Kerberos to authenticate is Kerberos set-up allready and if so do you have problems authenticating other machines on the network????
If so then maybe the KDC (Key Distribution Centre) hasnt been setup correctly, know I am grasping slightly but as you mentioned that your PDC may not be set up for kerberos I just thought that Id point out that you would need to set a machine up to deal with this in order to integrate correctly with AD as Kerberos and AD on win 2k are tightly integrated and as such any AD authentication via Kerberos would require the use of a Key distribution Centre to access the AD database to check the details and obviouly to allow authentication and TGT (Ticket to Get Ticket) generation.
Thanks for the help. I actually dug a little deeper and it turns out that Kerberos is not yet in production, just testing. So I am not actually using Kerberos when trying to use winbind and AD. Your comment helped, though, as I was able to probe and find out that our AD servers are not setup to handle Kerberos. It will be something that we will be adding though.
I have found that I am having a problem with my pam modules. pam_winbind.so to be specific. It seems to be failing on me when I try to use the login pam:
Jul 18 16:29:24 pam_winbind[20827]: Verify user
`xxxx+xxxx'
Jul 18 16:29:25 pam_winbind[20827]: user 'xxxx+xxxx'
granted acces
Jul 18 16:15:36 pam_winbind[20781]: user `xxxx+xxxx'
not found
Jul 18 16:29:25 login[20827]: pam_unix2:
pam_sm_acct_mgmt() called
Jul 18 16:29:27 login[20827]: pam_unix2: pam_ldap
returned 10
Jul 18 16:29:27 login[20827]: User not known to the
underlying authentication module
Distribution: Slack 8.1, Gentoo 1.3a, Red Hat 7.3, Red Hat 7.2, Manrake 8.2
Posts: 328
Rep:
Ive noy used Pam at all or win bind. But what it looks like is that the user that is trying to be authenticated doesent exist.
You could check the user exists and is configured correctly, again I wouldnt be able to help a great deal with specific problems as Ive not used either. But try using a differrent user account to test it.
Other than this Im not to sure but if the problmens continue post back, Im sure somebody will be able to help you.
Yes, that is the error that it is giving. The user exists in the AD. You can see that winbind acknowledges this since it says 'user granted access.' The problem looks like it is coming at a different spot. That error about 'user not found' is attributed to "account sufficient pam_winbind.so" in the pam module. I can't figure out exactly why this is failing.
I think I've gotten a step closer. The entry in pam
'account sufficient pam_winbind.so' performs a
getpwnam() on the username. For some reason, it
doesn't seem to be going out the PDC to do this.
Is there a way to change this or get it to recognize
the PDC?
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.