Thanks very much for the feedback.

RE: how often do we need to lookup unauthenticated users......this is strictly 
a test environment used to duplicate customer problems
so in reality we never have to do it but that is the current problem at 
hand.....customer is unable to consistently authenticate users.
They have implemented additional screening limits for the users, but for now we 
are only trying to get the basic functionality to work.

In our case, am unable to authenticate the valid users on the AD server using 
ssh on the IdM server;

[root@linux ~]# ssh -l ld...@osn.cxo.cpqcorp.net linux
ld...@osn.cxo.cpqcorp.net@linux's password:
Permission denied, please try again.
ld...@osn.cxo.cpqcorp.net@linux's password:
Received disconnect from 10.20.0.59: 2: Too many authentication failures for 
ld...@osn.cxo.cpqcorp.net<mailto:ld...@osn.cxo.cpqcorp.net>

We know the password that is used for this test user is correct.

The logs and the tcpdump seem to indicate a problem with Kerberos verification 
but not being a Kerberos heavy, I'm not sure
just what might be wrong, possibly with the krb5.conf file.     This is the 
krb5kdc.log entry for the attempted ssh login above:

Oct 08 08:58:51 linux.ipa.cxo.cpqcorp.net krb5kdc[12908](info): AS_REQ (6 
etypes {18 17 16 23 25 26}) 10.20.0.59: NEEDED_PREAUTH: 
host/linux.ipa.cxo.cpqcorp....@ipa.cxo.cpqcorp.net for 
krbtgt/ipa.cxo.cpqcorp....@ipa.cxo.cpqcorp.net, Additional pre-authentication 
required
Oct 08 08:58:51 linux.ipa.cxo.cpqcorp.net krb5kdc[12908](info): AS_REQ (6 
etypes {18 17 16 23 25 26}) 10.20.0.59: ISSUE: authtime 1412773131, etypes 
{rep=18 tkt=18 ses=18}, host/linux.ipa.cxo.cpqcorp....@ipa.cxo.cpqcorp.net for 
krbtgt/ipa.cxo.cpqcorp....@ipa.cxo.cpqcorp.net
Oct 08 08:58:51 linux.ipa.cxo.cpqcorp.net krb5kdc[12908](info): TGS_REQ (6 
etypes {18 17 16 23 25 26}) 10.20.0.59: ISSUE: authtime 1412773131, etypes 
{rep=18 tkt=18 ses=18}, host/linux.ipa.cxo.cpqcorp....@ipa.cxo.cpqcorp.net for 
ldap/linux.ipa.cxo.cpqcorp....@ipa.cxo.cpqcorp.net
Oct 08 08:58:51 linux.ipa.cxo.cpqcorp.net krb5kdc[12908](info): closing down fd 
11

>From tcpdump, the error given by Kerberos is STATUS_DOMAIN_TRUST_INCONSISTENT

>From the IdM server, this is the trust setup previously between the IdM server 
>and the AD server;

[root@linux ~]# ipa trust-show osn.cxo.cpqcorp.net
  Realm name: osn.cxo.cpqcorp.net
  Domain NetBIOS name: OSN
  Domain Security Identifier: S-1-5-21-3753757867-1859638558-383537475
  Trust direction: Two-way trust
  Trust type: Active Directory domain

Further down in this e-mail is the krb5.conf file.

Do we have something defined incorrectly for Kerberos ?

Al









From: freeipa-users-boun...@redhat.com 
[mailto:freeipa-users-boun...@redhat.com] On Behalf Of Dmitri Pal
Sent: Tuesday, October 07, 2014 5:02 PM
To: freeipa-users@redhat.com
Subject: Re: [Freeipa-users] domain trust linux to AD server not finding user 
profiles

On 10/07/2014 05:03 PM, Licause, Al (CSC AMS BCS - UNIX/Linux Network Support) 
wrote:
[cid:part1.03030509.00090400@redhat.com]

I've been following the steps outlined in section 7.3.5 of the manual entitled

Integrating OpenShift Enterprise
with Identity Management (IdM)
in Red Hat Enterprise Linux
OpenShift Enterprise 2.1
IdM in Red Hat Enterprise Linux 7
Windows Server 2012 - Active Directory Integration

I now have our RHEL V7 running IdM, setup as an IdM Server in a domain, Realm 
and subnet
different from our existing AD server running Windows 2008 R2 with a populated 
user database
that can be queried using ldapsearch and can authorize users.

I have successfully created a domain trust between the RHEL V7 Server
(linux.ipa.cxo.cpqcorp.net 10.20.0.59/24) and the AD Server
(win2008.osn.cxo.cpqcorp.net 16.112.240.55).

To simplify the configuration I have no firewall running and so have stopped 
both iptables
and firewalld.

All steps in section 7.3.5 have been followed.   But when I run the first test 
for a user
on the AD system, the system is unable to find anything:

[root@linux ~]# getent group 'OSN\Domain Users'
[root@linux ~]#
[root@linux ~]#
[root@linux ~]# getent passwd 'OSN\ldap25'
[root@linux ~]#

The users and related information are not fetched until you authenticate as 
this user.
The ability to fetch users and groups that are not yet authenticated is tracked 
by the ticket https://fedorahosted.org/sssd/ticket/2159 and will be addressed 
in the next version of SSSD.
How frequently do you really need to lookup unauthenticated AD users and AD 
groups on linux systems? What is the use case?

The ticket above is for the cases when there is an application that needs to 
fetch the user so that admin of the application can assign privileges to this 
user. But this is a pretty corner case.




I find this in the krb5kdc.log file:
Oct 07 16:28:01 linux.ipa.cxo.cpqcorp.net krb5kdc[12908](info): AS_REQ (6 
etypes {18 17 16 23 25 26}) 10.20.0.59: NEEDED_PREAUTH: 
host/linux.ipa.cxo.cpqcorp....@ipa.cxo.cpqcorp.net<mailto:host/linux.ipa.cxo.cpqcorp....@ipa.cxo.cpqcorp.net>
 for 
krbtgt/ipa.cxo.cpqcorp....@ipa.cxo.cpqcorp.net<mailto:krbtgt/ipa.cxo.cpqcorp....@ipa.cxo.cpqcorp.net>,
 Additional pre-authentication required
Oct 07 16:28:01 linux.ipa.cxo.cpqcorp.net krb5kdc[12908](info): AS_REQ (6 
etypes {18 17 16 23 25 26}) 10.20.0.59: ISSUE: authtime 1412713681, etypes 
{rep=18 tkt=18 ses=18}, 
host/linux.ipa.cxo.cpqcorp....@ipa.cxo.cpqcorp.net<mailto:host/linux.ipa.cxo.cpqcorp....@ipa.cxo.cpqcorp.net>
 for 
krbtgt/ipa.cxo.cpqcorp....@ipa.cxo.cpqcorp.net<mailto:krbtgt/ipa.cxo.cpqcorp....@ipa.cxo.cpqcorp.net>
Oct 07 16:28:01 linux.ipa.cxo.cpqcorp.net krb5kdc[12908](info): TGS_REQ (6 
etypes {18 17 16 23 25 26}) 10.20.0.59: ISSUE: authtime 1412713681, etypes 
{rep=18 tkt=18 ses=18}, 
host/linux.ipa.cxo.cpqcorp....@ipa.cxo.cpqcorp.net<mailto:host/linux.ipa.cxo.cpqcorp....@ipa.cxo.cpqcorp.net>
 for 
ldap/linux.ipa.cxo.cpqcorp....@ipa.cxo.cpqcorp.net<mailto:ldap/linux.ipa.cxo.cpqcorp....@ipa.cxo.cpqcorp.net>
Oct 07 16:28:01 linux.ipa.cxo.cpqcorp.net krb5kdc[12908](info): closing down fd 
11

I'm not quite sure what else I'm missing or have not understood in order to 
query the
AD server from the linux IdM server...but it would appear that something is not 
correctly
defined in the krb5.conf file found below:

[root@linux ~]# cat /etc/krb5.conf
includedir /var/lib/sss/pubconf/krb5.include.d/

[logging]
default = FILE:/var/log/krb5libs.log<FILE:///\\var\log\krb5libs.log>
kdc = FILE:/var/log/krb5kdc.log<FILE:///\\var\log\krb5kdc.log>
admin_server = FILE:/var/log/kadmind.log<FILE:///\\var\log\kadmind.log>

[libdefaults]
default_realm = IPA.CXO.CPQCORP.NET
dns_lookup_realm = false
dns_lookup_kdc = true
rdns = false
ticket_lifetime = 24h
forwardable = yes
default_ccache_name = KEYRING:persistent:%{uid}

[realms]
IPA.CXO.CPQCORP.NET = {
  kdc = linux.ipa.cxo.cpqcorp.net:88
  master_kdc = linux.ipa.cxo.cpqcorp.net:88
  admin_server = linux.ipa.cxo.cpqcorp.net:749
  default_domain = ipa.cxo.cpqcorp.net
  pkinit_anchors = FILE:/etc/ipa/ca.crt<FILE:///\\etc\ipa\ca.crt>
  auth_to_local = 
RULE:[1:$1@$0](^.*@OSN.CXO.CPQCORP.NET$)s/@OSN.CXO.CPQCORP.NET/@osn.cxo.cpqcorp.net/<mailto:%5e.*@OSN.CXO.CPQCORP.NET$)s/@OSN.CXO.CPQCORP.NET/@osn.cxo.cpqcorp.net/>
 auth_to_local = DEFAULT
}

OSN.CXO.CPQCORP.NET = {
  kdc = win2008.osn.cxo.cpqcorp.net
  master_kdc = win2008.osn.cxo.cpqcorp.net
  admin_sever = win2008.osn.cxo.cpqcorp.net
  }

[domain_realm]
.ipa.cxo.cpqcorp.net = IPA.CXO.CPQCORP.NET
ipa.cxo.cpqcorp.net = IPA.CXO.CPQCORP.NET
.osn.cxo.cpqcorp.net = OSN.CXO.CPQCORP.NET
osn.cxo.cpqcorp.net = OSN.CXO.CPQCORP.NET

[dbmodules]
  IPA.CXO.CPQCORP.NET = {
    db_library = ipadb.so
  }



Any help greatly appreciated.

Al

Al Licause
CSC Americas BCS Technical Specialist
HP Customer Support Center
Hours 5am-2pm Pacific time USA
Manager: mark.bai...@hp.com<mailto:mark.bai...@hp.com>







--

Thank you,

Dmitri Pal



Sr. Engineering Manager IdM portfolio

Red Hat, Inc.
-- 
Manage your subscription for the Freeipa-users mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-users
Go To http://freeipa.org for more info on the project
-- 
Manage your subscription for the Freeipa-users mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-users
Go To http://freeipa.org for more info on the project

Reply via email to