On 26/03/2013 14:21, Alex Sharaz wrote:
Hi., I've been running ntlm_auth to authenticate our 802.1x users
against AD for a number of months without problems…… until this
morning when our Systems group tightened up auth requirements to only
use NTLMv2. and my ntlm_auth module started failing

As Alan says - you're hosed. They will need to rollback the change if you want Samba/ntlm_auth to continue working.

All the web stuff I've found doesn;t seem to mention v2 at all. Back
in the dim and distant past I got round the ntlm v2 issue when using
OSC Radiator by proxying off auths to Radiator running on a windows
machine bound to AD and using their AuthBy LSA authentication
mechanism.

When you say "windows machine", do you mean "ordinary domain member" as opposed to "domain controller"?

If so, this is interesting. It suggests that MSCHAP can still be checked with NTLMv2 enforced, just not via whatever API Samba/ntlm_auth uses.

You should ask on the Samba lists - if a windows domain member can do it, there must be a newer API/RPC which Samba could implement.

It is possible, though unlikely IMO, that one of the other ntlm_auth modes, such as

--helper-protocol=ntlm-server-1

...use different RPCs, and may work. If you can, try and get a valid challenge/response pair, and then drive ntlm_auth using the ntlm-server-1 protocol (see "man ntlm_auth"). If that works, it would be possible in theory to use a wrapper script. But IIRC, it's the same code path, so Samba fixes will be needed.

The other "option" (yuck) is to run NPS (or Radiator) on a Windows server, and proxy your MSCHAP to that. But if other RADIUS servers have the ability to work with NTLMv2 enforced, it would be nice to get it with FR too.
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to