<hits brakes, swerves> ... "have to add the user as an administrator on the local machine"? That's pretty intriguing, but not great security-wise, unfortunately. Not a big deal at the moment, though

ok, just made my user account an admin but it's still dragging on login.

My IPA setup is the same: ipa-server-4.2.0-15.0.1.el7.centos.6.1.x86_64

Any chance i could get a denatured plist from you offline, Joe?

cheers

Cal Sawyer | Systems Engineer | BlueBolt Ltd
15-16 Margaret Street | London W1W 8RW
+44 (0)20 7637 5575 | www.blue-bolt.com

On 21/06/16 16:07, Joe DiTommasso wrote:
No fiddling that I remember. Basically got the setup working once and then have been pushing out plist files to all new installs. Graphical login works, as does sudo, sort of-still have to add the user as an administrator on the local machine, but then their kerberos password works for authentication. Running up-to-date-ish IPA 4 on CentOS 7.

jdito@sum-freeipa-01:~$ rpm -qa | grep ipa

*ipa*-python-4.2.0-15.0.1.el7.centos.6.1.x86_64

lib*ipa*_hbac-1.13.0-40.el7_2.4.x86_64

*ipa*-server-4.2.0-15.0.1.el7.centos.6.1.x86_64

python-in*ipa*rse-0.4-9.el7.noarch

*ipa*-server-dns-4.2.0-15.0.1.el7.centos.6.1.x86_64

sssd-*ipa*-1.13.0-40.el7_2.4.x86_64

*ipa*-client-4.2.0-15.0.1.el7.centos.6.1.x86_64

python-lib*ipa*_hbac-1.13.0-40.el7_2.4.x86_64

*ipa*-admintools-4.2.0-15.0.1.el7.centos.6.1.x86_64


Let me know what you'd like to see from my config. Thanks for the tip on the secondary groups-I already had that in there, but looking at it realized that I needed to point at the compat tree, because the regular one doesn't expose memberUID.


On Tue, Jun 21, 2016 at 10:42 AM, Cal Sawyer <ca...@blue-bolt.com <mailto:ca...@blue-bolt.com>> wrote:

    Wow, that's surprising, Joe.  I'm also using the linsec recipe.
    Yours required no fiddling?   You can login straight off from the
    graphical loginWindow?

    Yes, very interested in any help you can offer.  Are you
    authenticating against IPA 3 or 4, for sake of curiosity.

    BTW:  you can get your secondary groups by:

        In Groups add attribute 'GroupMembership' mapped to 'memberUID'

    thanks!

    Cal Sawyer | Systems Engineer | BlueBolt Ltd 15-16 Margaret Street
    | London W1W 8RW +44 (0)20 7637 5575
    <tel:%2B44%20%280%2920%207637%205575>  |www.blue-bolt.com 
<http://www.blue-bolt.com>

    On 21/06/16 15:07, Joe DiTommasso wrote:
    I've actually got a whole stack of El Capitan clients
    authenticating against FreeIPA:

    mac-mini-01:~ jdito$ system_profiler SPSoftwareDataType
    Software:

        System Software Overview:

          System Version: OS X 10.11.5 (15F34)
          Kernel Version: Darwin 15.5.0
          Boot Volume: Macintosh HD
          Boot Mode: Normal
          Computer Name: admin’s Mac mini
          User Name: Joe DiTommasso (jdito)
          Secure Virtual Memory: Enabled
          System Integrity Protection: Enabled
          Time since boot: 14 days 15:00

    The Linsec guide worked for me. The only real issue is that it
    only sees the user's primary group, and not supplemental groups.
    I'm not terribly good with Macs, but happy to assist in
    troubleshooting.

    Joe

    On Tue, Jun 21, 2016 at 9:46 AM, Cal Sawyer <ca...@blue-bolt.com
    <mailto:ca...@blue-bolt.com>> wrote:

        As usual, apologies for any formatting issues due to
        extracting message threads out of digests ...

        Anyhow., i have determined where everything goes terribly
        wrong with OSX clients:  OSX 10.10.3 ("out of the box"
        Yosemite) works fine using linsec.ca <http://linsec.ca>'s
        guidance.  However, the second you patch to 10.10.5 or
        upgrade to El Capitan (10.11.5), authentication fails
absolutely in the ways described in earlier threads. Colleagues who i've spoken with who are trying to set up IPA
        at their facilities report the same problem and it's a total
        show-stopper. Interesting how all(?) of what is written on
        the topic of OSX and IPA dries up after 10.8, although we've
        seen in an earlier thread reports of 10.9 working.  I've
        repeated this test a few times and the result is always the
        same. - 10.10.3 is the last OSX capable of authenticating
        against IPA using currently available knowledge.

        Running tcpdump on 10.10.3 and a 10.10.5 clients show very
        different authentication dialogues.  I'm afraid, however,
        that i lack the skills to interpret where exactly the later
        OSX release is failing. I have my (unfounded) suspicions -
        that SASL binding for LDAP and kerberos are implicated.
        10.10.3 certainly shows no kerberos transactions whereas 10.10.5

        Re DNS: both client types resolve all SRV records hosted in
        IPA fine.  I even went so far as setting up rudimentary ipv6
        as there were some AAAA requests that were going unanswered
        and it thought it might related (not, as it turns out)

        So, would anyone on the IPA team be interested in looking at
        some packet captures?  I'm completely up for working with
        you, providing whatever is needed and doing testing.  It
        would be fantastic to restore IPA-based auth for newer OSX
        releases.

        best regards,

        - cal sawyer

            From: John Obaterspok<john.obaters...@gmail.com>
            <mailto:john.obaters...@gmail.com>
            To: Nicola Canepa<canep...@mmfg.it> <mailto:canep...@mmfg.it>
            Cc:"freeipa-users@redhat.com" <mailto:freeipa-users@redhat.com>  
<freeipa-users@redhat.com> <mailto:freeipa-users@redhat.com>,  Cal Sawyer
                <ca...@blue-bolt.com> <mailto:ca...@blue-bolt.com>

                Hi, Are you only having problems to login to login to
                OSX with the IPA user now? If that is the case then
                check the DNS settings you are using and make sure
                the IPA server is listed first and that it has full
                name. Exactly the same problem occurred for me with
                the slow logins to OSX which was due to the DNS
                settings and that OSX only used short name of IPA
                server during login (if I logged in as local user I
                could ping and lookup hosts using short name) -- john
                2015-12-21 17:49 GMT+01:00 Nicola Canepa
                <canep...@mmfg.it> <mailto:canep...@mmfg.it>:
                I had to configure /etc/krb5.conf, and to avoid the requested 
reboot, I
                did a "dscacheutil -flushcache", both as the logged in user and 
as root.
                I tried enabling the anonymous bind and now also the directory 
browser
                (and all the login process) works as expected.

                Nicola

                Il 21/12/15 17:39, Cal Sawyer ha scritto:

                Thanks, John and Nicola

                Kerberos occurred to me as well late in the day yesterday.  
Happily (?),
                knit works fine simply specifying the user in question with no 
need to
                suffix with the kerberos realm

                I did find that my test user had an expired password, which i 
fixed on the
                IPA server.  This was never flagged up under Linux, btw.  It 
has not change
                anything, however, other than not prompting for password 
changes that never
                take effect.  Funnily, it expired in the midst of testing - fun.

                I was mistaken when i said i was unable to log in - it turns 
out that it
                takes almost 10 minutes for a login from the frintend to 
complete - i just
                didn't wait long enough.  10 mins is of course unacceptable :)  "su 
- user"
                and "login user" fail outright after rejecting accept any 
user's password

                DNS is fine and i can resolve ldap and kerberos SRV records 
from the Mac

                In line with Nicola's experience, i can browse groups and users 
in the
                Directory Editor and all attributes appear spot on.

                Besides modding /etc/pam.d/authorization, adding a corrected
                edu.mit.kerberos to /LibraryPreferences and setting up the 
directory per
                linsec.ca <http://linsec.ca>, can anyone think of something i 
may have missed?  It's a real
                shame that the documentation on this stops around 5 years ago.

                IPA devs: is there anything i should be on the lookout for in 
the dirsrv
                or krb5 logs on the IPA master?  I've disabled the secondary to 
prevent
                replication from clouding the log events

                thanks, everyone

                Cal Sawyer | Systems Engineer | BlueBolt Ltd
                15-16 Margaret Street | London W1W 8RW+44 (0)20 7637 5575
                <tel:%2B44%20%280%2920%207637%205575>  |www.blue-bolt.com 
<http://www.blue-bolt.com>

                On 21/12/15 07:57, Nicola Canepa wrote:

                Hello, I tried 2 weeks ago from Mavericks (OSX 10.9), but I had 
the
                opposite problem: kinit works fine, while I'm unable to see 
users with
                Directory Admin ((it always says it cant' connect, either with 
or without
                SSL)
                I disabled anonymous searches in 389-ds, by the way.

                Nicola

                Il 21/12/15 07:50, John Obaterspok ha scritto:

                Hi Cal,

                Does a kinit work from a terminal? Does it work if you use "kinit 
user" or
                just if you use "kinit<user@REALM.suffix>
                <mailto:user@REALM.suffix>user@REALM.suffix
                <mailto:user@REALM.suffix>"

                -- john


                2015-12-20 15:09 GMT+01:00 Cal Sawyer<ca...@blue-bolt.com> 
<mailto:ca...@blue-bolt.com>:

                Hi, all

                I'm attempting to set up LDAP auth (against IPA server 4.10) 
from a OSX
                10.10.5 (Yosemite) client

                Using the excellent instructions at
                
<http://linsec.ca/Using_FreeIPA_for_User_Authentication#Mac_OS_X_10.7.2F10.8%20%22Linsec.ca%20tutorial%20for%20connecting%20Mac%20OS%2010.7%20to%20IPA%20Server>
                
<http://linsec.ca/Using_FreeIPA_for_User_Authentication#Mac_OS_X_10.7.2F10.8%20%22Linsec.ca%20tutorial%20for%20connecting%20Mac%20OS%2010.7%20to%20IPA%20Server>
                
http://linsec.ca/Using_FreeIPA_for_User_Authentication#Mac_OS_X_10.7.2F10.8%20%22Linsec.ca%20tutorial%20for%20connecting%20Mac%20OS%2010.7%20to%20IPA%20Server,
                I've populated the specified files, d/l'd the cert, am able to 
configure
                Users and Groups objects/attribs and browse both from within 
OSX's
                Directory Utility.    ldapsearch similarly returns the expected 
results.

                In spite of this, i'm unable to authenticate as any IPA-LDAP 
user on this
                system

                dirsrv log on the ipa master shows no apparent errors - remote 
auth
                attempts exit with "RESULT err=0 tag=101 nentries=1 etime=0", 
but tell the
                truth, there so much stuff there and being rather inexperienced 
with LDAP
                diags i might easily be missing something in the details

                Thelinsec.ca <http://linsec.ca>  instructions were written in 
the 10.7-10.8 era so
                something may have changed since.  Having said that, we've had 
no problems
                authenticating against our existing OpenLDAP server (which IPA 
is slated to
                replace) right up to 10.10.5 with no zero to our Directory 
Utility setup.

                Hoping someone here has some contemporary experience with OSX 
and IPA and
                for whom this issue rings a bell?

                many thanks

                Cal Sawyer | Systems Engineer | BlueBolt Ltd
                15-16 Margaret Street | London W1W 8RW
                +44 (0)20 7637 5575 <%2B44%20%280%2920%207637%205575> 
|www.blue-bolt.com <http://www.blue-bolt.com>



        --
        Manage your subscription for the Freeipa-users mailing list:
        https://www.redhat.com/mailman/listinfo/freeipa-users
        Go to http://freeipa.org for more info on the project





-- 
Manage your subscription for the Freeipa-users mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-users
Go to http://freeipa.org for more info on the project

Reply via email to