Re: [Samba] Feedback to getting to samba 4 blog

2010-01-15 Thread Guillaume Rousse

Le 14/01/2010 15:07, Andreas Moroder a écrit :

Hello,

I did not find a way tu put my opinion to the blog so I answer here. I
hope this is ok.

We ( a public hospital ) are one of the few that have no AD, because I
wanted to wait that samba has this functionality.
Every solution that give us the stability of samba and also AD is ok for
us, but please this year, otherwise I will be force to start with MS AD.
You can use AD, while still delegating autentication to a unix-based 
kerberos realm. And use samba for print and file services.


--
BOFH excuse #357:

I'd love to help you -- it's just that the Boss won't let me near the 
computer.

--
To unsubscribe from this list go to the following URL and read the
instructions:  https://lists.samba.org/mailman/options/samba


Re: [Samba] strange issue with xerox printer: unable to configure driver

2010-01-06 Thread Guillaume Rousse

Le 23/12/2009 18:23, Ryan Suarez a écrit :

Hi,

Still working this out with the vendor.

Could you guys try this driver with the Xerox 7xxx model and let me know
if it plays nicer with samba?

http://www.support.xerox.com/go/getfile.asp?Xlang=fr_FR&XCntry=FRA&objid=55425&EULA=1&prodID=WC7228_WC7235_WC7245&Family=WorkCentre&ripId=&langs=English%20(US)&plats=Windows%20XP&Xtype=download&uType=



Their thoughts is the device mode issue which we're all familiar with:
"Be aware that a valid device mode can only be initiated by a _printer
admin_
<http://www.samba.org/samba/docs/man/Samba-HOWTO-Collection/smb.conf.5.html>
or root (the reason should be obvious). Device modes can be correctly
set only by executing the printer driver program itself. Since Samba
cannot execute this Win32 platform driver code, it sets this field
initially to NULL (which is not a valid setting for clients to use).
Fortunately, most drivers automatically generate the printer driver data
that is needed when they are uploaded to the/ [print$]/ share with the
help of the APW or rpcclient. "

I just tried.

I can assign any driver, and correctly set default printing properties 
(which I can't with current driver). However, I can't print. I guess 
this is because my specific printer model (7435)  is not supported by 
this old driver version: it's not listed, and I tried all included 
models without success.


So far, I've got the choice between a printing-but-not-configurable 
driver, and a non-printing-but-configurable one :)

--
Guillaume Rousse
Service des Moyens Informatiques
INRIA Saclay - Île-de-France
Parc Orsay Université, 4 rue J. Monod
91893 Orsay Cedex France
Tel: 01 69 35 69 62
--
To unsubscribe from this list go to the following URL and read the
instructions:  https://lists.samba.org/mailman/options/samba


[Samba] strange issue with xerox printer: unable to configure driver

2009-11-27 Thread Guillaume Rousse

Hello list.

I've a strange issue with a samba 3.4.3 print server. Everything is fine 
with most printers, meaning drivers are assigned on server side and 
automatically distributed to the clients as expected. However, I fail to 
configure a Xerox document center 7435 the same way.


When I attempt to assign a driver to the printer, from a windows client 
with admin privileges,  I get an 'unexpected error occured in the print 
driver, close this windows and retry' error message, twice. More 
precisely, I can see initial renaming of the printer according to the 
driver name, then the error occurs, then the printer get renamed to '' 
(which is a bit painful :P)


I previously had a slightly different model (document center pro c2636) 
which was working fine. The other working printers are not xerox ones.


The driver is OK: it works fine when accessing the printer directly, and 
also when used from a windows print server. Also, I tried other variants 
(such as PCL driver instead of PS one), without success.


When configuring the same printer from a Windows system, I had to 
configure it with raw socket connection, because IPP connection didn't 
allowed me to share it at all, and CIFS connection to the print queue 
caused me some troubles (the printer didn't appeared in the 'fax and 
printers list' of the server from remote hosts).


The underlying printing system, cups, works perfectly. I've tried to 
switch from IPP to raw socket connection, because of the behaviour 
changes found with windows server, it didn't change anything.


I performed a network capture both on server and client side while 
triggering the error. The result is available as:

http://www.zarb.org/~guillomovitch/server.pcap
http://www.zarb.org/~guillomovitch/client.pcap

I can see some suspicious messages such as:
WINREG  OpenKey response, Error: WERR_BADFILE
SPOOLSS	GetPrinterData response, PrintProcCaps_NT EMF 1.008, File not 
found (pathname error)

SPOOLSS SetPrinterDataEx response, Access denied

But nothing really useful.

I'm joining my samba configuration file. I'm using mandriva 2009.0 as 
server, and windows XP enterprise as client.


Any hint appreciated.
--
BOFH excuse #198:

Post-it Note Sludge leaked into the monitor.
# cfengine-distributed file
# any local change will get lost
# $Id: smb.conf 7619 2009-11-27 14:00:18Z rousse $
# vim:et:sw=4

#=== Global Settings =
[global]

# 1. Server Naming Options:
# workgroup = NT-Domain-Name or Workgroup-Name
   workgroup = MSR-INRIA
   realm = MSR-INRIA.IDF

# netbios name is the name you will see in "Network Neighbourhood",
# but defaults to your hostname
#  netbios name = 

# server string is the equivalent of the NT Description field
   server string = Etoile

# Message command is run by samba when a "popup" message is sent to it.
# The example below is for use with LinPopUp:
; message command = /usr/bin/linpopup "%f" "%m" %s; rm %s

# 2. Printing Options:
# CHANGES TO ENABLE PRINTING ON ALL CUPS PRINTERS IN THE NETWORK
# (as cups is now used in linux-mandrake 7.2 by default)
# if you want to automatically load your printer list rather
# than setting them up individually then you'll need this
   printcap name = cups
   load printers = yes

# printcap cache time, so samba will automatically load new cups printers
   printcap cache time = 60

# It should not be necessary to spell out the print system type unless
# yours is non-standard. Currently supported print systems include:
# bsd, sysv, plp, lprng, aix, hpux, qnx, cups
   printing = cups

# Samba 2.2 supports the Windows NT-style point-and-print feature. To
# use this, you need to be able to upload print drivers to the samba
# server. The printer admins (or root) may install drivers onto samba.
# Note that this feature uses the print$ share, so you will need to 
# enable it below.
# Printer admins are now defined by granting the SePrintOperatorPrivilege, ie:
# run: net rpc rights grant 'DOMAIN\Printer Operators' SePrintOperatorPrivilege

# 3. Logging Options:
# this tells Samba to use a separate log file for each machine
# that connects
   log file = /var/log/samba/%m.log

# Put a capping on the size of the log files (in Kb).
   max log size = 50

# Set the log (verbosity) level (0 <= log level <= 10)
# log level = 3

# 4. Security and Domain Membership Options:
# This option is important for security. It allows you to restrict
# connections to machines which are on your local network. The
# following example restricts access to two C class networks and
# the "loopback" interface. For more examples of the syntax see
# the smb.conf man page. Do not enable this if (tcp/ip) name resolution does
# not work for all the hosts in your network.
#   hosts allow = 192.168.1. 192.168.2. 127.

# guest access
  map to guest = bad user
  guest account = nobody

# Security mode. Most people will want user level security. See
# security_level.txt for details.
   security = ads
# Use pass

Re: [Samba] desactivating NTLM fallback when accessing a share and kerberos auth fails

2009-02-12 Thread Guillaume Rousse

Volker Lendecke a écrit :

On Thu, Feb 12, 2009 at 09:49:01AM +0100, Guillaume Rousse wrote:

Is there any way to either:
- perform some kind of name canonicalization, either on client or server 
side ?


Set the correct service principal names in your DC.

Many thanks, it worked.

And I also made large progress in understanding behavior of kerberos 
under windows now. For instance, the client always tries first the local 
KDC (the one serving the kerberos realm matching its DNS domain), even 
if adressing a service in another realm, and the Windows KDC only if the 
first one didn't provided a referal...


--
BOFH excuse #54:

Evil dogs hypnotised the night shift
--
To unsubscribe from this list go to the following URL and read the
instructions:  https://lists.samba.org/mailman/options/samba


Re: [Samba] desactivating NTLM fallback when accessing a share and kerberos auth fails

2009-02-12 Thread Guillaume Rousse

Volker Lendecke a écrit :

On Wed, Feb 11, 2009 at 05:10:02PM +0100, Guillaume Rousse wrote:

Guillaume Rousse a écrit :
For members of the domain, tough, the client first attempt a kerberos 
auth, which fails, as he is not using print server FQDN, and doesn't 
performs host name canonicalization. 
Actually, from reading the logs, this is false: samba doesn't even 
attempt to perform a kerberos auth when a share is accessed through a 
non-FQDN name, but directly attempts NTLM:


[2009/02/11 16:59:46,  3] 
smbd/sesssetup.c:reply_sesssetup_and_X_spnego(1173)

  Doing spnego session setup
[2009/02/11 16:59:46,  3] 
smbd/sesssetup.c:reply_sesssetup_and_X_spnego(1208)
  NativeOS=[Windows 2002 Service Pack 3 2600] NativeLanMan=[Windows 
2002 5.1] PrimaryDomain=[]

[2009/02/11 16:59:46, 10] smbd/sesssetup.c:check_spnego_blob_complete(1121)
  check_spnego_blob_complete: needed_len = 180, pblob->length = 180
[2009/02/11 16:59:46,  3] libsmb/ntlmssp.c:ntlmssp_server_auth(745)
  Got user=[rousse] domain=[MSR-INRIA] workstation=[OBERKAMPF] len1=24 
len2=24

[2009/02/11 16:59:46,  5] auth/auth_ntlmssp.c:auth_ntlmssp_set_challenge(68)
  auth_context challenge set by NTLMSSP callback (NTLM2)


Look at the sniff. Your KDC sends a PRINCIPAL_UNKNOWN when
the client asks for the ticket with the wrong servername.
The client then falls back to ntlmssp.

OK, so my initial assumption was not totally erroneous :)

Is there any way to either:
- perform some kind of name canonicalization, either on client or server 
side ?
- desactivate any kind of authentication but kerberos, either for this 
share, or globally ?

--
BOFH excuse #417:

Computer room being moved.  Our systems are down for the weekend.
--
To unsubscribe from this list go to the following URL and read the
instructions:  https://lists.samba.org/mailman/options/samba


Re: [Samba] desactivating NTLM fallback when accessing a share and kerberos auth fails

2009-02-11 Thread Guillaume Rousse

Guillaume Rousse a écrit :
For members of the domain, tough, the client first attempt a kerberos 
auth, which fails, as he is not using print server FQDN, and doesn't 
performs host name canonicalization. 
Actually, from reading the logs, this is false: samba doesn't even 
attempt to perform a kerberos auth when a share is accessed through a 
non-FQDN name, but directly attempts NTLM:


[2009/02/11 16:59:46,  3] 
smbd/sesssetup.c:reply_sesssetup_and_X_spnego(1173)

  Doing spnego session setup
[2009/02/11 16:59:46,  3] 
smbd/sesssetup.c:reply_sesssetup_and_X_spnego(1208)
  NativeOS=[Windows 2002 Service Pack 3 2600] NativeLanMan=[Windows 
2002 5.1] PrimaryDomain=[]

[2009/02/11 16:59:46, 10] smbd/sesssetup.c:check_spnego_blob_complete(1121)
  check_spnego_blob_complete: needed_len = 180, pblob->length = 180
[2009/02/11 16:59:46,  3] libsmb/ntlmssp.c:ntlmssp_server_auth(745)
  Got user=[rousse] domain=[MSR-INRIA] workstation=[OBERKAMPF] len1=24 
len2=24

[2009/02/11 16:59:46,  5] auth/auth_ntlmssp.c:auth_ntlmssp_set_challenge(68)
  auth_context challenge set by NTLMSSP callback (NTLM2)

When using a FQDN, this becomes:

[2009/02/11 16:57:33,  3] 
smbd/sesssetup.c:reply_sesssetup_and_X_spnego(1173)

  Doing spnego session setup
[2009/02/11 16:57:33,  3] 
smbd/sesssetup.c:reply_sesssetup_and_X_spnego(1208)
  NativeOS=[Windows 2002 Service Pack 3 2600] NativeLanMan=[Windows 
2002 5.1] PrimaryDomain=[]

[2009/02/11 16:57:33, 10] smbd/password.c:register_initial_vuid(194)
  register_initial_vuid: allocated vuid = 114
[2009/02/11 16:57:33, 10] smbd/sesssetup.c:check_spnego_blob_complete(1121)
  check_spnego_blob_complete: needed_len = 1365, pblob->length = 1365
[2009/02/11 16:57:33,  5] smbd/sesssetup.c:parse_spnego_mechanisms(749)
  parse_spnego_mechanisms: Got OID 1 2 840 48018 1 2 2
[2009/02/11 16:57:33,  5] smbd/sesssetup.c:parse_spnego_mechanisms(749)
  parse_spnego_mechanisms: Got OID 1 2 840 113554 1 2 2
[2009/02/11 16:57:33,  5] smbd/sesssetup.c:parse_spnego_mechanisms(749)
  parse_spnego_mechanisms: Got OID 1 3 6 1 4 1 311 2 2 10
[2009/02/11 16:57:33,  3] smbd/sesssetup.c:reply_spnego_negotiate(800)
  reply_spnego_negotiate: Got secblob of size 1299
[2009/02/11 16:57:33, 10] 
libads/kerberos_verify.c:ads_secrets_verify_ticket(273)


Can someone enlighten me about this behaviour difference ?
--
To unsubscribe from this list go to the following URL and read the
instructions:  https://lists.samba.org/mailman/options/samba


[Samba] desactivating NTLM fallback when accessing a share and kerberos auth fails

2009-02-11 Thread Guillaume Rousse

Hello.

I have a print server member of an AD domain, and my users are 
autenthicated through an external kerberos domain. My samba server FQDN 
is 'etoile.msr-inria.inria.fr', and has 'cups.msr-inria.inria.fr' as DNS 
alias.


For foreign visitors, everything works fine: when attempting to reach 
\\cups, samba immediatly detect from given credentials than user comes 
from an unknown domains, and immediatly give him guest access. That's 
the desirable behaviour.


For members of the domain, tough, the client first attempt a kerberos 
auth, which fails, as he is not using print server FQDN, and doesn't 
performs host name canonicalization. It then attempt NTLM auth as 
fallback, which can't succeed either, as the user doesn't have a valid 
password in the domain (he's using external auth service). When this 
fails, it is then allowed to access the service as guest, but that's a 
bit ugly and counter-intuitive :( On the other hand, if he tries to 
access \\etoile.msr-inria.inria.fr instead, kerberos auth works, and the 
user can access the service with its own credentials.


I'd like to avoid giving different usage informations to visitors and 
members, and I'd also like everyone accessing the service through the 
CNAME, so as to be able to migrate if freely. Is there a way to achieve 
this with current settings ?


As I'm not really interested by authentication here, unless for admins 
to change print drivers, I'm thinking of moving from 'ads' security 
model to simplest 'share' one, and using a local samba-specific password 
database for admins. Currently, I didn't found any advantage of making 
the print server member of the domain.


I'm using samba 3.2.9 on Linux, and here is relevant part of my 
configuration:

[global]
   workgroup = MSR-INRIA
   realm = MSR-INRIA.IDF
   use kerberos keytab = yes
   server string = Etoile
   printcap name = cups
   load printers = yes
   printcap cache time = 60
   printing = cups
   log file = /var/log/samba/%m.log
   max log size = 50
   log level = 3
   map to guest = bad user
   guest account = nobody
   security = ads
   encrypt passwords = yes
  username map = /etc/samba/smbusers
   local master = no
   domain master = no
   preferred master = no
   dns proxy = yes
   wins support = no
   wins proxy = no
[printers]
comment = All Printers
path = /var/spool/samba
browseable = yes
guest ok = yes
writable = no
printable = yes
create mode = 0700
print command = lpr-cups -P %p -o raw %s -r
use client driver = no
[print$]
   comment = Print drivers
   path = /var/lib/samba/printers
   browseable = yes
   write list = root
   guest ok = yes

--
BOFH excuse #449:

greenpeace free'd the mallocs
--
To unsubscribe from this list go to the following URL and read the
instructions:  https://lists.samba.org/mailman/options/samba


[Samba] samba, ADS and privileges management

2009-01-27 Thread Guillaume Rousse

I also tried to set explicit privileges, without success:
[r...@etoile samba]# net -w MSR-INRIA.IDF -U Administrateur rpc rights 
grant 'MSR-INRIA.IDF\rousse' SePrintOperatorPrivilege

Password:
Failed to grant privileges for MSR-INRIA.IDF\rousse 
(NT_STATUS_ACCESS_DENIED)


Enumerating existing privileges seems to imply my domain admins group 
only has SeMachineAccountPrivilege currently:
[r...@etoile samba]# net -w MSR-INRIA.IDF -U Administrateur rpc rights 
list accounts

Password:
BUILTIN\Print Operators
No privileges assigned

BUILTIN\Account Operators
No privileges assigned

BUILTIN\Backup Operators
No privileges assigned

BUILTIN\Server Operators
No privileges assigned

S-1-5-21-2709371413-4020681702-788637496-5012
SeMachineAccountPrivilege

BUILTIN\Administrators
SeMachineAccountPrivilege
SeTakeOwnershipPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeRemoteShutdownPrivilege
SePrintOperatorPrivilege
SeAddUsersPrivilege
SeDiskOperatorPrivilege

Everyone
No privileges assigned

Any help appreciated here to understand what I'm going wrong. BTW, I'm 
using samba-3.0.28a on linux platform. I may eventually consider 
upgrading if needed.


[1] I'm using a localized Win 2003 AD server, hence the french names
[2] I'm autenticating Windows users using an heimdal server, hence the 
presence of both MSR-INRIA.INRIA.FR\rousse and MSR-INRIA.IDF\rousse entries.

--
Guillaume Rousse
Service des Moyens Informatiques
INRIA Saclay - Ile de France
Tel: 01 69 35 69 62
--
To unsubscribe from this list go to the following URL and read the
instructions:  https://lists.samba.org/mailman/listinfo/samba


Re: [Samba] Two problems with Samba in AD realm

2008-11-14 Thread Guillaume Rousse

Pascal Levy a écrit :

On Wednesday 12 November 2008 19:23:52 Guillaume Rousse wrote:

Hello list.

I recently moved to an AD environment. I'm still keeping a samba servers
to make my cups-managed printers available to windows users, rather than
duplicating configuration with a Windows print service. But I'm facing
two problems, probably due to the way we manage AD.

First, all my host belong to a Unix-managed DNS domain
(msr-inria.inria.fr), not to the windows-managed one corresponding to
the AD realm (msr-inria.idf). It means resolving their IP address result
in foo.msr-inria.inria.fr, not in foo.msr-inria.idf. The Unix DNS is a
secondary server for the foo.msr-inria.idf, meaning SRV record lookup
still works. But all CIFS kerberos authentication attempt for the host
unqualified, or realm-qualified fails: I can't use \\foo, nor
\\foo.msr-inria.idf, only \\foo.msr-inria.inria.fr

I know this is probably due to kerberos DNS-based hostname
canonicalisation, and not samba-specific (it also occurs with netapp
filers), but I initially understood it with my samba server. Is there
anything I could do there to make user's life easier ?



seems very complicated to me. Maybe you could use only one DNS system with 
differents dns zones (something like msr-inria.inria.fr for your general 
domain and windows.msr-inria.inria.fr for the AD part) all managed with bind ? 
This is what we have here and this allow a box to know is actual name without 
any kind of schizophrenia.
It doesn't change very much: you're just trading bind with dynamic 
update vs microsoft DNS, and subzone vs foreign private zone. And the 
result is the same, as you still have three different identities for any 
 host belonging to your domain:

- unqualified name
- legacy DNS-qualified name
- AD-qualified name


if you need foo to be resolve as foo.msr-inria.inria.fr, you could have
 foo.msr-inria.inria.fr CNAME  foo.windows.msr-inria.inria.fr
 foo.windows.msr-inria.inria.fr A x.x.x.x
x.x.x.x PTR  foo.windows.msr-inria.inria.fr

(...)

There is a user mapping option in samba, but it is primary meant for
mapping Windows users to Unix users, whereas I'd need there to map
Windows unqualified users to kerberos-realm users, instead of ad-realm
users. Is this possible someway ?


I'm not sure to understand exactly your problem but I think that samba can't 
use a non-AD-kerberos-realm. If there is a way, i'm very interesting, though.
It does. The simple fact than accessing any host with its legacy 
DNS-qualified name works show than SSO works.


The problem I'm facing here is precisely when it doesn't, and when the 
client apparently fallback to NTLM autentication. The samba server 
apparently tries to autenticate on the AD controler as \user, 
whereas I can only autenticate through alternative identity realm>\user. I've to check against a Windows server to compare behaviour.


--
Guillaume Rousse
Service des Moyens Informatiques
INRIA Saclay - Ile de France
Tel: 01 69 35 69 62
--
To unsubscribe from this list go to the following URL and read the
instructions:  https://lists.samba.org/mailman/listinfo/samba


[Samba] Two problems with Samba in AD realm

2008-11-12 Thread Guillaume Rousse

Hello list.

I recently moved to an AD environment. I'm still keeping a samba servers 
to make my cups-managed printers available to windows users, rather than 
duplicating configuration with a Windows print service. But I'm facing 
two problems, probably due to the way we manage AD.


First, all my host belong to a Unix-managed DNS domain 
(msr-inria.inria.fr), not to the windows-managed one corresponding to 
the AD realm (msr-inria.idf). It means resolving their IP address result 
in foo.msr-inria.inria.fr, not in foo.msr-inria.idf. The Unix DNS is a 
secondary server for the foo.msr-inria.idf, meaning SRV record lookup 
still works. But all CIFS kerberos authentication attempt for the host 
unqualified, or realm-qualified fails: I can't use \\foo, nor 
\\foo.msr-inria.idf, only \\foo.msr-inria.inria.fr


I know this is probably due to kerberos DNS-based hostname 
canonicalisation, and not samba-specific (it also occurs with netapp 
filers), but I initially understood it with my samba server. Is there 
anything I could do there to make user's life easier ?


Second, when kerberos autentication fails, my samba server (and I guess, 
any CIFS server) fallbacks into password-based autentication. But there 
is an issue with the way we manage users account. We sync our unix ldap 
account into AD, meaning each 'bar' user exists in LDAP as 
'MSR-INRIA.IDF\bar', but with a random password, and we authenticate 
them through their Unix-managed kerberos account 
'MSR-INRIA.INRIA.FR\bar'. It means trying to authenticate them as 
'MSR-INRIA.IDF\bar' won't work, and I get those error messages:

[2008/11/12 18:47:32, 0] auth/auth_domain.c:domain_client_validate(260)
  domain_client_validate: unable to validate password for user rousse 
in domain MSR-INRIA to Domain controller CONCORDE.MSR-INRIA.IDF. Error 
was NT_STATUS_WRONG_PASSWORD.

[2008/11/12 18:47:32, 0] auth/auth_domain.c:domain_client_validate(260)
  domain_client_validate: unable to validate password for user rousse 
in domain MSR-INRIA to Domain controller CONCORDE.MSR-INRIA.IDF. Error 
was NT_STATUS_WRONG_PASSWORD.

[2008/11/12 18:47:32, 0] auth/auth_domain.c:domain_client_validate(260)
  domain_client_validate: unable to validate password for user rousse 
in domain MSR-INRIA to Domain controller CONCORDE.MSR-INRIA.IDF. Error 
was NT_STATUS_WRONG_PASSWORD.


(I guess the windows client cached my credentials when I initially 
logged in).


There is a user mapping option in samba, but it is primary meant for 
mapping Windows users to Unix users, whereas I'd need there to map 
Windows unqualified users to kerberos-realm users, instead of ad-realm 
users. Is this possible someway ?

--
Guillaume Rousse
Service des Moyens Informatiques
INRIA Saclay - Ile de France
Tel: 01 69 35 69 62
--
To unsubscribe from this list go to the following URL and read the
instructions:  https://lists.samba.org/mailman/listinfo/samba


Re: [Samba] heimdal and windows compatibility up-to-date informations

2008-10-20 Thread Guillaume Rousse

Pascal Levy a écrit :

Thanks for your input.

Yet additional few questions, now I'm trying it...

I'm understanding the users are supposed to autenticate against the 
kerberos realm, not against he AD domain. But this only appears in the 
connection dialog once once you ran ksetup on the windows host. Is there 
a way to automatically configure this when the host join the domain, 
rather than manually on each host (/me is a total AD newbie) ?


And is there a way to prevent the display of the AD realm in this 
dialog, to prevent user confusion ?

--
Guillaume Rousse
Moyens Informatiques - INRIA Futurs
Tel: 01 69 35 69 62
--
To unsubscribe from this list go to the following URL and read the
instructions:  https://lists.samba.org/mailman/listinfo/samba


Re: [Samba] AD to authenticate users against Samba + LDAP

2008-10-13 Thread Guillaume Rousse

Andrei Mikhailovsky a écrit :

Hi all,

I was wondering if it is possible to make MS Active Directory to
authenticate against Samba + LDAP? I have a working Samba + LDAP setup
in the data centre and need to have MS Active Directory to authenticate
against the userbase which has been already setup on Samba + LDAP.
No way current, as AD relies on Kerberos. You have to wait for samba 4. 
Or alternatively, look at previous post 'Heimdal/AD documentation' if 
you're ready to setup a Kerberos database alongside your LDAP server.


--
Guillaume Rousse
Moyens Informatiques - INRIA Futurs
Tel: 01 69 35 69 62
--
To unsubscribe from this list go to the following URL and read the
instructions:  https://lists.samba.org/mailman/listinfo/samba


Re: [Samba] heimdal and windows compatibility up-to-date informations

2008-10-10 Thread Guillaume Rousse

Pascal Levy a écrit :

On Wednesday 08 October 2008 12:54:48 Guillaume Rousse wrote:

I'm back on this old question, because I'm now really working on it.

Andrew Bartlett a écrit :

Second, I was looking at better way to sync users accounts between our
new ldap-backed heimdal kdc and our windows AD. Currently, we have an
automated task synchronising user entries into Windows LDAP from our
Unix LDAP hourly, and a password-management CGI propagating password
changes to both systems (using an ugly VB CGI on windows side to
effectively change the password). I was wondering if the password
handling stuff could be merged with the ldap synchronisation task, now
we store kerberos keys in LDAP.

Windows does not allow the password attributes to be manipulated like
that.  You could potentially read and set passwords with Samba4's
DRSUAPI synchronisation, but you can't do it with just Heimdal or just
LDAP.


I don't know if this could be usefull for you but what we are doing here is to 
keep real users passwords only in heimdal KDC.


openldap authentication is made by using sasl mechanism with 
[EMAIL PROTECTED] as userPassword chain
AD authentication is made by using a trust relationship with heimdal KDC and a 
mapping beetwen AD accounts and heimdal KDC principals. ldap/heimdal/AD 
accounts are keep in sync with a perl script running each 15 min.
AD userPassword is a (very) long random chain created by the perl script and 
set in AD with ldap tools.


users can change there password by using normal windows change password 
interface. Admins can use heimdal tools to manage passwords directly on the 
kdc.

That's sound really interesting, but I don't understand some points:

- how do you have AD knows it can get a kerberos ticket from the heimdal 
KDC ? Did you set the user userPrincipalName attribute to a principal 
from heimdal managed realm ?


- is the AD userPassword attribute ever used in this case ?

- what's the exact usefulness of having OpenLDAP auth redirected to SASL 
mechanism ? Just for managing a single password ? We have heimdal using 
openldap as backend, and use smbkrb5 overlay to keep them synced 
already, so it may be useless for us.


- how do you prevent ExOP PasswdChange to rewrite userPassword attribute 
with a normal value, and keep '[EMAIL PROTECTED]' instead ?


- what exact cyphers did you use to ensure compatibility between heimdal 
and your AD controller ? From Heimdal documentation, we used 
des3-hmac-sha1 and des-cbc-crc, but it's quite old. From previous Andrew 
answer, I understand we may use arcfour-hmac-md5 as well now.


Thanks for your input.
--
Guillaume Rousse
Moyens Informatiques - INRIA Futurs
Tel: 01 69 35 69 62
--
To unsubscribe from this list go to the following URL and read the
instructions:  https://lists.samba.org/mailman/listinfo/samba


Re: [Samba] Samba as PDC+OpenLDAP: unique login?

2008-10-08 Thread Guillaume Rousse

Joao Amancio a écrit :

Questions:


   1. There is a way to populate Samba (users, groups) with the OpenLDAP
   base?
If you already have your users in your base, you just have to add 
additional classes and attributes to them.



   2. It's really needed to get users at: linux local system, samba and
   openldap? Where's is the "single sign on" idea in this case?
The single sign on idea is exactly the opposite: make all your users 
LDAP entries members of posixAccount and sambaSamAccount classes. And 
use smbkrb5 overlay to ensure password sync.


You'd better start having a correctly configured linux user base in 
OpenLDAP first. Then configure samba to also, and run 'smbpasswd -a' for 
each of your users to add sambaSamAccount attributes to them, as well as 
initialising their windows password.

--
Guillaume Rousse
Moyens Informatiques - INRIA Futurs
Tel: 01 69 35 69 62
--
To unsubscribe from this list go to the following URL and read the
instructions:  https://lists.samba.org/mailman/listinfo/samba


Re: [Samba] heimdal and windows compatibility up-to-date informations

2008-10-08 Thread Guillaume Rousse

I'm back on this old question, because I'm now really working on it.

Andrew Bartlett a écrit :
Second, I was looking at better way to sync users accounts between our 
new ldap-backed heimdal kdc and our windows AD. Currently, we have an 
automated task synchronising user entries into Windows LDAP from our 
Unix LDAP hourly, and a password-management CGI propagating password 
changes to both systems (using an ugly VB CGI on windows side to 
effectively change the password). I was wondering if the password 
handling stuff could be merged with the ldap synchronisation task, now 
we store kerberos keys in LDAP.


Windows does not allow the password attributes to be manipulated like
that.  You could potentially read and set passwords with Samba4's
DRSUAPI synchronisation, but you can't do it with just Heimdal or just
LDAP.
I succeded setting or changing the unicodePwd attribute in AD, through 
pure LDAP operation. It allows me to pass autentication when trying to 
open a remote desktop sessions (which immediatly fails for authorization 
issue). But I guess it isn't enough to handle the kerberos part of AD 
authentication system.


From http://wiki.samba.org/index.php/Samba4/ActiveDirectory#DRSUAPI, it 
seems than this API is far from being usable now.


As I doubt from your answer it's not, I'm still interested about best 
way to handle AD user accounts remotely, without local windows code 
relay. Is there any issue directly modifying AD base through LDAP 
connection ? My windows colleage currently prefers to dump LDIF entries, 
and import them through a windows-specific tool. And how to set windows 
password from perl code ? I'm currently biased toward using an external 
smbpassword call, but maybe are they better ways.


You could certainly run Samba tools to set the user's password, if you
wanted.
Well, smbpassword (from samba 3) allows one user to change its password, 
provided he knows its current one. But from the man page, it seems 
impossible to use it with a privilegiated account (member of account 
operation group) to change someone's else password against an AD controller.


So, am I missing something if I use ldap operation to at least set up an 
initial password for the user, then have him use smbpassword to make it 
fully operational ?

--
Guillaume Rousse
Moyens Informatiques - INRIA Futurs
Tel: 01 69 35 69 62
--
To unsubscribe from this list go to the following URL and read the
instructions:  https://lists.samba.org/mailman/listinfo/samba


Re: [Samba] heimdal and windows compatibility up-to-date informations

2008-07-18 Thread Guillaume Rousse

Andrew Bartlett a écrit :

On Thu, 2008-07-17 at 11:18 +0200, Guillaume Rousse wrote:

Hello list.

Heimdal documentation still refers to Windows 2000 for Kerberos 
compatibility issues. Is there anything more recent somewhere, 
considering Windows 2003 and 2008, for instance ?


In particular, I'm quite curious to know if, when using a ldap-backend 
for heimdal, I could just copy my kerberos password attributes into the 
AD server, provided I'm using compatible encryptions, and expect it to 
work magically :)


No.

Perhaps we need to step back a bit - what are you trying to do?
First, to establish a trust relationship between the two realms, as was 
already possible with previous heimdal/windows version. But I think 
compatibility informations given on documentation about encryption types 
supported by Windows have to be updated, I can't think Windows 2008 
still supports only des-cbc-crc.


Second, I was looking at better way to sync users accounts between our 
new ldap-backed heimdal kdc and our windows AD. Currently, we have an 
automated task synchronising user entries into Windows LDAP from our 
Unix LDAP hourly, and a password-management CGI propagating password 
changes to both systems (using an ugly VB CGI on windows side to 
effectively change the password). I was wondering if the password 
handling stuff could be merged with the ldap synchronisation task, now 
we store kerberos keys in LDAP.


As I doubt from your answer it's not, I'm still interested about best 
way to handle AD user accounts remotely, without local windows code 
relay. Is there any issue directly modifying AD base through LDAP 
connection ? My windows colleage currently prefers to dump LDIF entries, 
and import them through a windows-specific tool. And how to set windows 
password from perl code ? I'm currently biased toward using an external 
smbpassword call, but maybe are they better ways.


Thanks.
--
Guillaume Rousse
Moyens Informatiques - INRIA Futurs
Tel: 01 69 35 69 62
--
To unsubscribe from this list go to the following URL and read the
instructions:  https://lists.samba.org/mailman/listinfo/samba


[Samba] heimdal and windows compatibility up-to-date informations

2008-07-17 Thread Guillaume Rousse

Hello list.

Heimdal documentation still refers to Windows 2000 for Kerberos 
compatibility issues. Is there anything more recent somewhere, 
considering Windows 2003 and 2008, for instance ?


In particular, I'm quite curious to know if, when using a ldap-backend 
for heimdal, I could just copy my kerberos password attributes into the 
AD server, provided I'm using compatible encryptions, and expect it to 
work magically :)

--
Guillaume Rousse
Moyens Informatiques - INRIA Futurs
Tel: 01 69 35 69 62
--
To unsubscribe from this list go to the following URL and read the
instructions:  https://lists.samba.org/mailman/listinfo/samba