Rowland penny
2021-May-06 10:42 UTC
[Samba] Keytab MEMORY:cifs_srv_keytab is nonexistent or empty
On 06/05/2021 11:26, Jeremy Monnet via samba wrote:> Hello, > > We have just upgraded a RHEL 7 to RHEL 8 virtual machine with samba > providing CIFS shares. We already had a hard time setting up sssd to > authenticate against the AD 2012R2 (we followed > https://access.redhat.com/solutions/5728591 )That link is behind a 'paywall' (or similar), but you mention 'samba', shares' and 'sssd' in the same sentence, are you aware that you can no longer use sssd with Samba and shares ?> > Now our keytab is fine (enough fine to allow AD users to authenticate) > but we cannot mount samba CIFS shares, with this message in logs : > [2021/05/06 12:03:35.664983, 0] > ../../lib/util/become_daemon.c:136(daemon_ready) > daemon_ready: daemon 'smbd' finished starting up and ready to serve > connections > [2021/05/06 12:04:04.508781, 0] > ../../source3/librpc/crypto/gse.c:606(gse_init_server) > smb_gss_krb5_import_cred failed with [Unspecified GSS failure. > Minor code may provide more information: Keytab MEMORY:cifs_srv_keytab > is nonexistent or empty] > [2021/05/06 12:04:04.511756, 0] > ../../source3/librpc/crypto/gse.c:606(gse_init_server) > smb_gss_krb5_import_cred failed with [Unspecified GSS failure. > Minor code may provide more information: Keytab MEMORY:cifs_srv_keytab > is nonexistent or empty] > > smb.conf looks like : > [global] > kerberos method = secrets and keytab > template homedir = /home/%U@%D > template shell = /bin/bash > security = userFor a Unix domain member, it should be 'security = ADS'> idmap config REALM : schema_mode = rfc2307 > idmap config REALM : range = 500-999999 > idmap config REALM : backend = adI take it that you do not have any local Unix users, and it should be 'DOMAIN' not 'REALM'> idmap config * : range = 10000000-10999999 > idmap config * : backend = tdbThe default domain '*' is meant for the 'Well Known SIDs' (there are less than 200 of those) and anything outside the 'DOMAIN', your default range is a bit excessive ?> winbind use default domain = no > winbind refresh tickets = yes > winbind offline logon = yes > winbind enum groups = no > winbind enum users = no > > [Share Tech] > path = /nfs > comment = partage nfs > read only = no > guest ok = no > public = yes'guest ok' and 'public' are the same, and you have it as the default 'no', then 'yes'. Not that it matters because you do not have 'map to guest = yes' in global, so you will not get guest access.> create mask = 0775 > directory mask = 0775 > valid users = @Groups > > > I haven't been able to figure what this issue might be ? In case > selinux would be implied I tried > https://www.linuxquestions.org/questions/linux-server-73/error-connecting-to-linux-samba-server-from-windows-clients-4175627094/ > chcon -t smbd_tmp_t /var/tmp/host_0 with no success. > > Thanks for your help, > > Jeremy >Rowland
Jeremy Monnet
2021-May-06 12:14 UTC
[Samba] Keytab MEMORY:cifs_srv_keytab is nonexistent or empty
Le jeu. 6 mai 2021 ? 12:43, Rowland penny via samba <samba at lists.samba.org> a ?crit :> On 06/05/2021 11:26, Jeremy Monnet via samba wrote: > > Hello, > > > > We have just upgraded a RHEL 7 to RHEL 8 virtual machine with samba > > providing CIFS shares. We already had a hard time setting up sssd to > > authenticate against the AD 2012R2 (we followed > > https://access.redhat.com/solutions/5728591 ) > > > That link is behind a 'paywall' (or similar), but you mention 'samba', > shares' and 'sssd' in the same sentence, are you aware that you can no > longer use sssd with Samba and shares ? >No, I didn't see that part ?! I hope I can still authenticate user against an AD using sssd, and have samba autonomous to provide Shares ? I couldn't find any article or information on that subject ? security = user is set automatically by realm when joining the domain. Which made me think it was set to work :-) Thanks, Jeremy