search for: winbindd_raw_kerberos_login

Displaying 8 results from an estimated 8 matches for "winbindd_raw_kerberos_login".

2006 Dec 14
1
winbindd_raw_kerberos_login: kinit failed
Hi, I have set up Samba 3.0.23d on Linux Suse NLD9 with AD idmap backend with security = ads and rfc2307. At every login there is a log message in log.wb-MYDOMAIN : [2006/12/14 17:46:51, 1] nsswitch/winbindd_pam.c:winbindd_raw_kerberos_login(510) winbindd_raw_kerberos_login: kinit failed for 'myuser@MYDOMAIN.COM' with: Invalid argument (22) with debug level 10: winbindd_dual_pam_auth: domain: MYDOMAIN last was online winbindd_dual_pam_auth_kerberos is_myname("MYDOMAIN") returns 0 using ccache: FILE:/tmp/krb5cc_5...
2008 Aug 01
1
Samba 3.0.31 stills fails to read and write to socket.
...ccache: MEMORY:winbindd_pam_ccache (internal) [2008/07/31 10:03:35, 10] libads/kerberos.c:kerberos_kinit_password_ext(91) kerberos_kinit_password: using [MEMORY:winbindd_pam_ccache] as ccache and config [/var/lib/samba/smb_krb5/krb5.conf.MYDOMAIN] [2008/07/31 10:03:55, 10] nsswitch/winbindd_pam.c:winbindd_raw_kerberos_login(580) got TGT for accountXYZ@OTHERDOMAIN.FORREST.COM in MEMORY:winbindd_pam_ccache (valid until: Thu, 31 Jul 2008 20:03:57 CDT (1217552637), renewable till: Thu, 31 Jul 2008 20:03:57 CDT (1217552617)) [2008/07/31 10:04:05, 4] libsmb/clikrb5.c:ads_krb5_mk_req(610) ads_krb5_mk_req: Advancing clock...
2015 May 12
1
[Solved] A working CUPS authentication now fails without change anything...
Greetings, Daniel Carrasco Mar?n! >> > Cups calls pam authentication, and pam use winbind then I need to give >> > permissions to winbind daemon but i don't know what account is using that >> > daemon. How i can see it?, because ps aux shows the most as root. >> >> winbind normally have access to Kerberos keytab by default. >> I see no reason why
2013 Sep 17
1
S4-Winbind dumping core on password
...0086, effective(0, 0), real(0, 0), class=winbind] ../source3/winbindd/winbindd_pam.c:531(generate_krb5_ccache) ? using ccache: FILE:/tmp/krb5cc_1099990999 [2013/09/17 17:52:27.867202, 10, pid=10086, effective(1099990999, 0), real(1099990999, 0), class=winbind] ../source3/winbindd/winbindd_pam.c:634(winbindd_raw_kerberos_login) ? winbindd_raw_kerberos_login: uid is 1099990999 [2013/09/17 17:52:28.699693,? 0] ../lib/util/fault.c:72(fault_report) ? =============================================================== [2013/09/17 17:52:28.699727,? 0] ../lib/util/fault.c:73(fault_report) ? INTERNAL ERROR: Signal 11 in pid 10086 (4...
2015 Jul 14
0
[Announce] Samba 4.2.3 Available for Download
...escription of "smb encrypt" to include SMB3 encryption. o Jeremy Allison <jra at samba.org> * BUG 11068: s3: lib: util: Ensure we read a hex number as %x, not %u. * BUG 11295: Excessive cli_resolve_path() usage can slow down transmission. * BUG 11328: winbindd: winbindd_raw_kerberos_login - ensure logon_info exists in PAC. * BUG 11339: s3: smbd: Use separate flag to track become_root()/unbecome_root() state. * BUG 11342: s3: smbd: Codenomicon crash in do_smb_load_module(). o Christian Ambach <ambi at samba.org> * BUG 11170: s3:param/loadparm: Fix ...
2015 Jul 14
0
[Announce] Samba 4.2.3 Available for Download
...escription of "smb encrypt" to include SMB3 encryption. o Jeremy Allison <jra at samba.org> * BUG 11068: s3: lib: util: Ensure we read a hex number as %x, not %u. * BUG 11295: Excessive cli_resolve_path() usage can slow down transmission. * BUG 11328: winbindd: winbindd_raw_kerberos_login - ensure logon_info exists in PAC. * BUG 11339: s3: smbd: Use separate flag to track become_root()/unbecome_root() state. * BUG 11342: s3: smbd: Codenomicon crash in do_smb_load_module(). o Christian Ambach <ambi at samba.org> * BUG 11170: s3:param/loadparm: Fix ...
2009 May 29
0
solution: wbinfo -K not working
Hi! The problem lies in the "winbind separator" settings. If I use winbind separator = \\ everything goes well. I believe this is due to a bug. As I don't want to register to yet another bugzilla, please someone issue the report there. Explanation: winbindd_raw_kerberos_login uses parse_domain_user to generate the kerberos principal from state->request.data.auth.user at this point state->request.data.auth.user is in form 'DOMAIN\username', regardless the winbind separator setting. parse_domain_user uses winbind separator setting to parse this, so it will f...
2014 Apr 26
1
SIGSEGV with pam_winbind kerberos authentication
Hello, I can't get Kerberos authentication works with my Linux clients. Server : samba 4.1.4 (compiled from source) Client : Debian Wheezy with sernet-samba 4.0.17-8 Without Kerberos authentication, everything works : -> the domain users can log with pam_winbind (with ssh, gdm ....). -> "kinit myuser at MYREALM" works fine. -> "wbinfo -K MYDOM\\myuser" works.