Gaiseric Vandal
2009-Nov-17 19:16 UTC
[Samba] Samba trusts, mapping issue, and pam crap domain
I am running Samba ver 3.0.37 on Solaris 10 (sparc) as a PDC with LDAP for the backend for both samba and unix accounts. Assume the samba SMBPDC is called "PDC." I have also set up a trust with an Windows domain- lets call it WINDOMAIN- (the PDC for the Windows domain is Win 2003 but is in mixed mode for backwards compat.) The SAMBA domain trusts the WINDOWS domain, not not vice versa. Assume the Windows PDC is called "WINPDC." I have winbind enabled. Idmap entries are stored in the backend. On the Windows domain, I have a login script which maps R: to \\PDC\dept\common. The "dept" share does not explicitly set or deny any users. The "common" directory has unix perms of "rwxrwxr-t." On the SMBPDC smbpdc# getent passwd | grep linus WINDOMAIN\linus:*:30197:30037:Linus Van Pelt:/home/ WINDOMAIN /linus:/bin/false smbpdc# smbpdc -3.00# id " WINDOMAIN \linus" uid=30197(ADMINISTRATION\linus) gid=30037(WINDOMAIN \domain users) bash-3.00# id linus id: invalid user name: "linus" smbpdc -3.00# Smb.conf includes ------------------------- ntlm auth = Yes passdb backend = ldapsam:ldap://ldap1.mydomain.com ldap suffix=o=mydomain.com ldap user suffix=ou=people ldap group suffix=ou=smb_groups ldap machine suffix=ou=machines ldap admin dn="cn=Directory Manager" ldap ssl = no ldap passwd sync = no ldap idmap suffix=ou=idmap winbind enum users = Yes winbind enum groups = no winbind use default domain = no winbind trusted domains only = no #ldap time out default is 15 sec ldap timeout=30 # idmap domains = WINDOMAIN, TESTDOMAIN idmap domains = WINDOMAIN idmap config WINDOMAIN:backend = ldap idmap config WINDOMAIN:readonly = no idmap config WINDOMAIN:default=no idmap config WINDOMAIN:ldap_base_dn = ou=windomain,ou=idmap,o=mydomain.com idmap config WINDOMAIN:ldap_user_dn = cn=Directory Manager idmap config WINDOMAIN:ldap_url =ldap1.mydomain.com idmap config WINDOMAIN:range 30000-39999 #idmap config TESTDOMAIN:backend = ldap #idmap config TESTDOMAIN:readonly = no #idmap config TESTDOMAIN:default=no #idmap config TESTDOMAIN:ldap_base_dn =ou=testdomain,ou=idmap,o=mydomain.com #idmap config TESTDOMAIN:ldap_user_dn = cn=Directory Manager #idmap config TESTDOMAIN:ldap_url =ldap1.mydomain.com #idmap config TESTDOMAIN:range 40000-49999 idmap alloc backend = ldap idmap alloc config:ldap_base_dn = ou=alloc,ou=idmap,o=mydomain.com idmap alloc config:ldap_user_dn = cn=Directory Manager idmap alloc config:ldap_url = ldap1.mydomain.com idmap alloc config:range = 70000 - 79999 [dept] path = /zexport/Dept read only = No create mask = 0770 force create mode = 0600 directory mask = 0775 force directory mode = 0600 inherit permissions = Yes inherit acls = Yes hide special files = Yes vfs objects = zfsacl zfsacl:acesort = dontcare nfs4:mode = special nfs4:chown = yes nfs4:acedup = merge -------------------- I have a test user "linus" on the WINDOMAIN domain. If I log into a WINDOMAIN account on WINPDC, I am prompted for credentials on the SAMBA/SMBPDC share and am denied. This used to work (sort of) - I recently added the Solaris patch to update from 3.0.35 to 3.0.37. The /var/log/samba/WINPDC.log file shows ... check_ntlm_password: Checking password for unmapped user [WINDOMAIN]\[linus]@[WINPDC] with the new password interface [2009/11/17 11:54:25, 3] auth/auth.c:(224) check_ntlm_password: mapped user is: [WINDOMAIN]\[linus]@[ WINPDC] [2009/11/17 11:54:25, 3] smbd/sec_ctx.c:(208) push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 [2009/11/17 11:54:25, 3] smbd/uid.c:(408) push_conn_ctx(0) : conn_ctx_stack_ndx = 0 [2009/11/17 11:54:25, 3] smbd/sec_ctx.c:(241) setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 [2009/11/17 11:54:25, 3] smbd/sec_ctx.c:(356) pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 [2009/11/17 11:54:25, 2] auth/auth.c:(319) check_ntlm_password: Authentication for user [linus] -> [linus] FAILED with error NT_STATUS_NO_SUCH_USER [2009/11/17 11:54:25, 3] smbd/error.c:(106) error packet at smbd/sesssetup.c(107) cmd=115 (SMBsesssetupX) NT_STATUS_LOGON_FAILURE [2009/11/17 11:54:35, 3] smbd/process.c:(1083) ... The /var/samba/log/log.wb-WINDOMAIN shows ... [2009/11/17 08:14:48, 3] nsswitch/winbindd_pam.c:(1755) [13932]: pam auth crap domain: WINDOMAIN user: lucy ... [13932]: pam auth crap domain: WINDOMAIN user: charlie [2009/11/17 10:59:54, 3] nsswitch/winbindd_pam.c:(1755) [13932]: pam auth crap domain: WINDOMAIN user: Administrator [2009/11/17 10:59:54, 3] nsswitch/winbindd_async.c:(754) [13932]: lookupsid S-1-5-21-xxxx [2009/11/17 10:59:54, 3] nsswitch/winbindd_ads.c:(1062) ads: fetch sequence_number for WINDOMAIN [2009/11/17 10:59:54, 3] libsmb/namequery.c:(1557) get_dc_list: preferred server list: ", *" [2009/11/17 10:59:54, 3] libads/ldap.c:(443) Connected to LDAP server 192.168.0.71 [2009/11/17 10:59:54, 3] libsmb/namequery.c:(1557) get_dc_list: preferred server list: ", *" [2009/11/17 10:59:54, 3] libads/ldap.c:(443) Connected to LDAP server 192.168.0.71 [2009/11/17 10:59:54, 3] libads/ldap.c:(443) Connected to LDAP server 192.168.0.71 [2009/11/17 10:59:54, 3] libads/sasl.c:(291) ads_sasl_spnego_bind: got OID=1 2 840 48018 1 2 2 [2009/11/17 10:59:54, 3] libads/sasl.c:(291) ads_sasl_spnego_bind: got OID=1 2 840 113554 1 2 2 [2009/11/17 10:59:54, 3] libads/sasl.c:(291) ads_sasl_spnego_bind: got OID=1 2 840 113554 1 2 2 3 [2009/11/17 10:59:54, 3] libads/sasl.c:(291) ads_sasl_spnego_bind: got OID=1 3 6 1 4 1 311 2 2 10 [2009/11/17 10:59:54, 3] libads/sasl.c:(300) ads_sasl_spnego_bind: got server principal name = SMBPDC$@ WINDOMAIN.DOMAIN.COM [2009/11/17 10:59:54, 3] libsmb/clikrb5.c:(593) ads_krb5_mk_req: krb5_cc_get_principal failed (No credentials cache file found) [2009/11/17 10:59:55, 3] libsmb/clikrb5.c:(528) ads_cleanup_expired_creds: Ticket in ccache[MEMORY:winbind_ccache] expiration Tue, 17 Nov 2009 20:59:55 EST [2009/11/17 10:59:55, 3] nsswitch/winbindd_rpc.c:(304) sid_to_name [rpc] S-1-5-xxxx for domain WINDOMAIN [2009/11/17 10:59:55, 3] nsswitch/winbindd_async.c:(754) [13932]: lookupsid S-1-5-xxxx- [2009/11/17 10:59:55, 3] nsswitch/winbindd_rpc.c:(304) sid_to_name [rpc] S-1-5-21-xxxxx for domain WINDOMAIN [2009/11/17 10:59:55, 3] nsswitch/winbindd_async.c:(754) [13932]: lookupsid S-1-5-21-xxxx [2009/11/17 10:59:55, 3] nsswitch/winbindd_rpc.c:(304) sid_to_name [rpc] S-1-5-21-xxxx for domain WINDOMAIN [2009/11/17 10:59:55, 3] nsswitch/winbindd_async.c:(754) [13932]: lookupsid S-1-5-21-xxxx [2009/11/17 10:59:55, 3] nsswitch/winbindd_rpc.c:(304) sid_to_name [rpc] S-1-5-21-1935655697-920026266-725345543-512 for domain WINDOMAIN [2009/11/17 10:59:55, 3] nsswitch/winbindd_async.c:(754) [13932]: lookupsid S-1-5-21-xxxx [2009/11/17 10:59:55, 3] nsswitch/winbindd_rpc.c:(304) sid_to_name [rpc] S-1-5-21-1935655697-920026266-725345543-519 for domain WINDOMAIN [2009/11/17 11:00:01, 3] nsswitch/winbindd_pam.c:(1755) [13932]: pam auth crap domain: WINDOMAIN user: Administrator [2009/11/17 11:00:02, 3] nsswitch/winbindd_async.c:(754) [13932]: lookupsid S-1-5-xxxx [2009/11/17 11:00:02, 3] nsswitch/winbindd_async.c:(754) [13932]: lookupsid S-1-xxxx [2009/11/17 11:00:02, 3] nsswitch/winbindd_async.c:(754) [13932]: lookupsid S-1-5xxxxx [2009/11/17 11:00:02, 3] nsswitch/winbindd_async.c:(754) [13932]: lookupsid S-1-xxxx [2009/11/17 11:00:02, 3] nsswitch/winbindd_async.c:(754) [13932]: lookupsid S-1-5-xxxx [2009/11/17 11:28:15, 3] nsswitch/winbindd_ads.c:(1062) ads: fetch sequence_number for WINDOMAIN [2009/11/17 11:28:15, 3] libads/ldap.c:(745) ads_do_paged_search_args: ldap_search_with_timeout((objectclass=*)) -> Timelimit exceeded [2009/11/17 11:28:15, 3] libads/ldap_utils.c:(76) Reopening ads connection to realm WINDOMAIN.DOMAIN.COM' after error Timelimit exceeded [2009/11/17 11:28:15, 3] libsmb/namequery.c:(1557) get_dc_list: preferred server list: ", *" [2009/11/17 11:28:15, 3] libads/ldap.c:(443) Connected to LDAP server 192.168.0.71 [2009/11/17 11:28:15, 3] libads/ldap.c:(443) Connected to LDAP server 192.168.0.71 [2009/11/17 11:28:15, 3] libads/sasl.c:(291) ads_sasl_spnego_bind: got OID=1 2 840 48018 1 2 2 [2009/11/17 11:28:15, 3] libads/sasl.c:(291) ads_sasl_spnego_bind: got OID=1 2 840 113554 1 2 2 [2009/11/17 11:28:15, 3] libads/sasl.c:(291) ads_sasl_spnego_bind: got OID=1 2 840 113554 1 2 2 3 [2009/11/17 11:28:15, 3] libads/sasl.c:(291) ads_sasl_spnego_bind: got OID=1 3 6 1 4 1 311 2 2 10 [2009/11/17 11:28:15, 3] libads/sasl.c:(300) ads_sasl_spnego_bind: got server principal name = SMBPDC$@ WINDOMAIN.DOMAIN.COM [2009/11/17 11:28:15, 3] libsmb/clikrb5.c:(528) ads_cleanup_expired_creds: Ticket in ccache[MEMORY:winbind_ccache] expiration Tue, 17 Nov 2009 20:59:55 EST [2009/11/17 11:28:15, 3] nsswitch/winbindd_rpc.c:(342) ... I am not using kerberos for anything. As far as I know, this should be an "NT4" type trust. NTLM a It seems to be some sort of mapping error? It looks like it doesn't handle the domain component properly, so strips it off, and then tries to authenticate just the user name- which of course it can't. Thoughts? Thanks
Gaiseric Vandal
2009-Nov-18 22:50 UTC
[Samba] Samba trusts, mapping issue, and pam crap domain
Before getting into too much detail- Is it possible that my samba PDC server is trying to treat the Windows PDC as an active directory domain controller (which of course it is) rather than a Windows NT4 server (which it should be emulating)? Would be it easier to setup a kerberos trust between my Samba server and the Windows Active Directory Maybe this will help isolate what is going wrong: If I type the following command from a solaris or linux workstation -> smbclient -U "WINDOMAIN\linus" -L SMBPDC Enter WINDOMAIN\linus's password: session setup failed: NT_STATUS_LOGON_FAILURE -> If I have restarted winbind, and this is the first smbclient attempt, /var/samba/log/wb-WINDOMAIN.log shows me the following: * * [2009/11/18 17:28:22, 3] nsswitch/winbindd_cm.c:(504) cm_get_ipc_userpass: No auth-user defined [2009/11/18 17:28:22, 3] rpc_client/cli_pipe.c:(2082) rpc_pipe_bind: Remote machine winpdc.windomain.domain.com pipe \lsarpc fnum 0xc000 bind request returned ok. [2009/11/18 17:28:22, 3] rpc_client/cli_pipe.c:(2082) rpc_pipe_bind: Remote machine winpdc.windomain.domain.com pipe \lsarpc fnum 0xc004 bind request returned ok. [2009/11/18 17:28:22, 3] rpc_parse/parse_lsa.c:(224) lsa_io_sec_qos: length c does not match size 8 [2009/11/18 17:28:22, 3] nsswitch/winbindd_pam.c:(1755) [17996]: pam auth crap domain: WINDOMAIN user: linus [2009/11/18 17:28:22, 3] rpc_client/cli_pipe.c:(2082) rpc_pipe_bind: Remote machine winpdc.windomain.domain.comi.com pipe \NETLOGON fnum 0xc002 bind request returned ok. [2009/11/18 17:28:22, 3] rpc_client/cli_pipe.c:(2082) rpc_pipe_bind: Remote machine winpdc.windomain.domain.com pipe \NETLOGON fnum 0xc003 bind request returned ok. ... Subsequent smbclient attempts just get logged as [2009/11/18 17:35:31, 3] nsswitch/winbindd_pam.c:(1755) [17996]: pam auth crap domain: WINDOMAIN user: linus But if I type the wrong password, I will get [2009/11/18 17:37:56, 3] nsswitch/winbindd_pam.c:(1755) [17996]: pam auth crap domain: WINDOMAIN user: linus [2009/11/18 17:37:56, 2] nsswitch/winbindd_pam.c:(1941) NTLM CRAP authentication for user [WINDOMAIN]\[linus] returned NT_STATUS_WRONG_PASSWORD (PAM: 9) So it is definately validating the password. smbpdc # ntlm_auth --username=linus --domain=WINDOMAIN password: NT_STATUS_OK: Success (0x0) smbpdc# wbinfo -a WINDOMAIN\\linus%Password plaintext password authentication succeeded challenge/response password authentication succeeded asterix# (ALthough I would have expected plaintext to fail.) If I type -> smbclient -U "WINDOMAIN\linus" -L SMBPDC but then don't enter a password, I will still see a list of shares (I guess anonymously?) If I type -> smbclient -U "WINDOMAIN\Administrator" -L SMBPDC I will get a list of shares. This will happen with any account name that exists in both domains, even if the password is different. So it all seems points to a mapping issue of some sort. Why does PAM even come into play? Do I need to enable winbind in pam.conf? I don't want to enable ssh or other "unix" level logins for the trusted users. Thanks On 11/17/09 14:16, Gaiseric Vandal wrote:> > > I am running Samba ver 3.0.37 on Solaris 10 (sparc) as a PDC with LDAP for > the backend for both samba and unix accounts. Assume the samba SMBPDC is > called "PDC." > > I have also set up a trust with an Windows domain- lets call it > WINDOMAIN- (the PDC for the Windows domain is Win 2003 but is in mixed > mode for backwards compat.) The SAMBA domain trusts the WINDOWS domain, > not not vice versa. Assume the Windows PDC is called "WINPDC." > > > I have winbind enabled. Idmap entries are stored in the backend. > > > On the Windows domain, I have a login script which maps R: to > \\PDC\dept\common. The "dept" share does not explicitly set or deny any > users. The "common" directory has unix perms of "rwxrwxr-t." > > > > > On the SMBPDC > > smbpdc# getent passwd | grep linus > WINDOMAIN\linus:*:30197:30037:Linus Van Pelt:/home/ WINDOMAIN > /linus:/bin/false > smbpdc# > > > smbpdc -3.00# id " WINDOMAIN \linus" > uid=30197(ADMINISTRATION\linus) gid=30037(WINDOMAIN \domain users) > bash-3.00# id linus > id: invalid user name: "linus" > smbpdc -3.00# > > > > > > > > Smb.conf includes > ------------------------- > > ntlm auth = Yes > > passdb backend = ldapsam:ldap://ldap1.mydomain.com > ldap suffix=o=mydomain.com > ldap user suffix=ou=people > ldap group suffix=ou=smb_groups > ldap machine suffix=ou=machines > ldap admin dn="cn=Directory Manager" > ldap ssl = no > ldap passwd sync = no > ldap idmap suffix=ou=idmap > > winbind enum users = Yes > winbind enum groups = no > winbind use default domain = no > winbind trusted domains only = no > > #ldap time out default is 15 sec > ldap timeout=30 > > # idmap domains = WINDOMAIN, TESTDOMAIN > idmap domains = WINDOMAIN > > > idmap config WINDOMAIN:backend = ldap > idmap config WINDOMAIN:readonly = no > idmap config WINDOMAIN:default=no > idmap config WINDOMAIN:ldap_base_dn = ou=windomain,ou=idmap,o=mydomain.com > idmap config WINDOMAIN:ldap_user_dn = cn=Directory Manager idmap config > WINDOMAIN:ldap_url =ldap1.mydomain.com idmap config WINDOMAIN:range > 30000-39999 > > > #idmap config TESTDOMAIN:backend = ldap > #idmap config TESTDOMAIN:readonly = no > #idmap config TESTDOMAIN:default=no > #idmap config TESTDOMAIN:ldap_base_dn > =ou=testdomain,ou=idmap,o=mydomain.com > #idmap config TESTDOMAIN:ldap_user_dn = cn=Directory Manager #idmap config > TESTDOMAIN:ldap_url =ldap1.mydomain.com #idmap config TESTDOMAIN:range > 40000-49999 > > > > idmap alloc backend = ldap > idmap alloc config:ldap_base_dn = ou=alloc,ou=idmap,o=mydomain.com > idmap alloc config:ldap_user_dn = cn=Directory Manager > idmap alloc config:ldap_url = ldap1.mydomain.com > idmap alloc config:range = 70000 - 79999 > > > > [dept] > path = /zexport/Dept > read only = No > create mask = 0770 > force create mode = 0600 > directory mask = 0775 > force directory mode = 0600 > inherit permissions = Yes > inherit acls = Yes > hide special files = Yes > vfs objects = zfsacl > zfsacl:acesort = dontcare > nfs4:mode = special > nfs4:chown = yes > nfs4:acedup = merge > > -------------------- > > > > I have a test user "linus" on the WINDOMAIN domain. If I log into a > WINDOMAIN account on WINPDC, I am prompted for credentials on the > SAMBA/SMBPDC share and am denied. This used to work (sort of) - I > recently added the Solaris patch to update from 3.0.35 to 3.0.37. > > > The /var/log/samba/WINPDC.log file shows > > ... > > > check_ntlm_password: Checking password for unmapped user > [WINDOMAIN]\[linus]@[WINPDC] with the new password interface > [2009/11/17 11:54:25, 3] auth/auth.c:(224) > check_ntlm_password: mapped user is: [WINDOMAIN]\[linus]@[ WINPDC] > [2009/11/17 11:54:25, 3] smbd/sec_ctx.c:(208) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 > [2009/11/17 11:54:25, 3] smbd/uid.c:(408) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 > [2009/11/17 11:54:25, 3] smbd/sec_ctx.c:(241) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 > [2009/11/17 11:54:25, 3] smbd/sec_ctx.c:(356) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 > [2009/11/17 11:54:25, 2] auth/auth.c:(319) > check_ntlm_password: Authentication for user [linus] -> [linus] FAILED > with error NT_STATUS_NO_SUCH_USER > [2009/11/17 11:54:25, 3] smbd/error.c:(106) > error packet at smbd/sesssetup.c(107) cmd=115 (SMBsesssetupX) > NT_STATUS_LOGON_FAILURE > [2009/11/17 11:54:35, 3] smbd/process.c:(1083) > ... > > > The /var/samba/log/log.wb-WINDOMAIN shows > > ... > [2009/11/17 08:14:48, 3] nsswitch/winbindd_pam.c:(1755) > [13932]: pam auth crap domain: WINDOMAIN user: lucy > ... > [13932]: pam auth crap domain: WINDOMAIN user: charlie > [2009/11/17 10:59:54, 3] nsswitch/winbindd_pam.c:(1755) > [13932]: pam auth crap domain: WINDOMAIN user: Administrator > [2009/11/17 10:59:54, 3] nsswitch/winbindd_async.c:(754) > [13932]: lookupsid S-1-5-21-xxxx > [2009/11/17 10:59:54, 3] nsswitch/winbindd_ads.c:(1062) > ads: fetch sequence_number for WINDOMAIN > [2009/11/17 10:59:54, 3] libsmb/namequery.c:(1557) > get_dc_list: preferred server list: ", *" > [2009/11/17 10:59:54, 3] libads/ldap.c:(443) > Connected to LDAP server 192.168.0.71 > [2009/11/17 10:59:54, 3] libsmb/namequery.c:(1557) > get_dc_list: preferred server list: ", *" > [2009/11/17 10:59:54, 3] libads/ldap.c:(443) > Connected to LDAP server 192.168.0.71 > [2009/11/17 10:59:54, 3] libads/ldap.c:(443) > Connected to LDAP server 192.168.0.71 > [2009/11/17 10:59:54, 3] libads/sasl.c:(291) > ads_sasl_spnego_bind: got OID=1 2 840 48018 1 2 2 > [2009/11/17 10:59:54, 3] libads/sasl.c:(291) > ads_sasl_spnego_bind: got OID=1 2 840 113554 1 2 2 > [2009/11/17 10:59:54, 3] libads/sasl.c:(291) > ads_sasl_spnego_bind: got OID=1 2 840 113554 1 2 2 3 > [2009/11/17 10:59:54, 3] libads/sasl.c:(291) > ads_sasl_spnego_bind: got OID=1 3 6 1 4 1 311 2 2 10 > [2009/11/17 10:59:54, 3] libads/sasl.c:(300) > ads_sasl_spnego_bind: got server principal name = SMBPDC$@ > WINDOMAIN.DOMAIN.COM > [2009/11/17 10:59:54, 3] libsmb/clikrb5.c:(593) > ads_krb5_mk_req: krb5_cc_get_principal failed (No credentials cache file > found) > [2009/11/17 10:59:55, 3] libsmb/clikrb5.c:(528) > ads_cleanup_expired_creds: Ticket in ccache[MEMORY:winbind_ccache] > expiration Tue, 17 Nov 2009 20:59:55 EST > [2009/11/17 10:59:55, 3] nsswitch/winbindd_rpc.c:(304) > sid_to_name [rpc] S-1-5-xxxx for domain WINDOMAIN > [2009/11/17 10:59:55, 3] nsswitch/winbindd_async.c:(754) > [13932]: lookupsid S-1-5-xxxx- > [2009/11/17 10:59:55, 3] nsswitch/winbindd_rpc.c:(304) > sid_to_name [rpc] S-1-5-21-xxxxx for domain WINDOMAIN > [2009/11/17 10:59:55, 3] nsswitch/winbindd_async.c:(754) > [13932]: lookupsid S-1-5-21-xxxx > [2009/11/17 10:59:55, 3] nsswitch/winbindd_rpc.c:(304) > sid_to_name [rpc] S-1-5-21-xxxx for domain WINDOMAIN > [2009/11/17 10:59:55, 3] nsswitch/winbindd_async.c:(754) > [13932]: lookupsid S-1-5-21-xxxx > [2009/11/17 10:59:55, 3] nsswitch/winbindd_rpc.c:(304) > sid_to_name [rpc] S-1-5-21-1935655697-920026266-725345543-512 for domain > WINDOMAIN > [2009/11/17 10:59:55, 3] nsswitch/winbindd_async.c:(754) > [13932]: lookupsid S-1-5-21-xxxx > [2009/11/17 10:59:55, 3] nsswitch/winbindd_rpc.c:(304) > sid_to_name [rpc] S-1-5-21-1935655697-920026266-725345543-519 for domain > WINDOMAIN > [2009/11/17 11:00:01, 3] nsswitch/winbindd_pam.c:(1755) > [13932]: pam auth crap domain: WINDOMAIN user: Administrator > [2009/11/17 11:00:02, 3] nsswitch/winbindd_async.c:(754) > [13932]: lookupsid S-1-5-xxxx > [2009/11/17 11:00:02, 3] nsswitch/winbindd_async.c:(754) > [13932]: lookupsid S-1-xxxx > [2009/11/17 11:00:02, 3] nsswitch/winbindd_async.c:(754) > [13932]: lookupsid S-1-5xxxxx > [2009/11/17 11:00:02, 3] nsswitch/winbindd_async.c:(754) > [13932]: lookupsid S-1-xxxx > [2009/11/17 11:00:02, 3] nsswitch/winbindd_async.c:(754) > [13932]: lookupsid S-1-5-xxxx > [2009/11/17 11:28:15, 3] nsswitch/winbindd_ads.c:(1062) > ads: fetch sequence_number for WINDOMAIN > [2009/11/17 11:28:15, 3] libads/ldap.c:(745) > ads_do_paged_search_args: ldap_search_with_timeout((objectclass=*)) -> > Timelimit exceeded > [2009/11/17 11:28:15, 3] libads/ldap_utils.c:(76) > Reopening ads connection to realm WINDOMAIN.DOMAIN.COM' after error > Timelimit exceeded > [2009/11/17 11:28:15, 3] libsmb/namequery.c:(1557) > get_dc_list: preferred server list: ", *" > [2009/11/17 11:28:15, 3] libads/ldap.c:(443) > Connected to LDAP server 192.168.0.71 > [2009/11/17 11:28:15, 3] libads/ldap.c:(443) > Connected to LDAP server 192.168.0.71 > [2009/11/17 11:28:15, 3] libads/sasl.c:(291) > ads_sasl_spnego_bind: got OID=1 2 840 48018 1 2 2 > [2009/11/17 11:28:15, 3] libads/sasl.c:(291) > ads_sasl_spnego_bind: got OID=1 2 840 113554 1 2 2 > [2009/11/17 11:28:15, 3] libads/sasl.c:(291) > ads_sasl_spnego_bind: got OID=1 2 840 113554 1 2 2 3 > [2009/11/17 11:28:15, 3] libads/sasl.c:(291) > ads_sasl_spnego_bind: got OID=1 3 6 1 4 1 311 2 2 10 > [2009/11/17 11:28:15, 3] libads/sasl.c:(300) > ads_sasl_spnego_bind: got server principal name = SMBPDC$@ > WINDOMAIN.DOMAIN.COM > [2009/11/17 11:28:15, 3] libsmb/clikrb5.c:(528) > ads_cleanup_expired_creds: Ticket in ccache[MEMORY:winbind_ccache] > expiration Tue, 17 Nov 2009 20:59:55 EST > [2009/11/17 11:28:15, 3] nsswitch/winbindd_rpc.c:(342) > ... > > > > > I am not using kerberos for anything. As far as I know, this should be > an "NT4" type trust. NTLM a It seems to be some sort of mapping error? > > > It looks like it doesn't handle the domain component properly, so strips > it off, and then tries to authenticate just the user name- which of > course it can't. > > Thoughts? > > Thanks > > > > > > >