Displaying 20 results from an estimated 8000 matches similar to: "Use other default credential cache then FILE"
2017 Sep 11
18
[Bug 2775] New: Improve kerberos credential forwarding support
https://bugzilla.mindrot.org/show_bug.cgi?id=2775
Bug ID: 2775
Summary: Improve kerberos credential forwarding support
Product: Portable OpenSSH
Version: 7.5p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: Kerberos support
Assignee:
2020 Aug 26
8
[Bug 3203] New: Could default_ccache_name from krb5.conf be used for GSSAPI connections?
https://bugzilla.mindrot.org/show_bug.cgi?id=3203
Bug ID: 3203
Summary: Could default_ccache_name from krb5.conf be used for
GSSAPI connections?
Product: Portable OpenSSH
Version: 8.3p1
Hardware: ix86
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
2020 Jul 29
1
kerberos ticket on login problem
On 7/28/2020 4:11 PM, Jason Keltz wrote:
>
> On 7/28/2020 3:59 PM, Jason Keltz via samba wrote:
>> I'm experimenting with smb + winbind.
>>
>> My host is joined to AD and I can login to my host fine using my AD
>> credentials via SSH.?? The only issue is that I don't get a Kerberos
>> ticket generated.
>>
>> In
2020 Jul 28
2
kerberos ticket on login problem
I'm experimenting with smb + winbind.
My host is joined to AD and I can login to my host fine using my AD
credentials via SSH.?? The only issue is that I don't get a Kerberos
ticket generated.
In /etc/security/pam_winbind.conf I have:
krb5_auth = yes
krb5_ccache_type = KEYRING
In /etc/krb5.conf, I also have:
default_ccache_name = KEYRING:persistent:%{uid}
Using wbinfo -K jas, then
2020 Sep 17
2
smbclient ignores configured kerberos ccache when using krb5-user on ubuntu/debian
On 17/09/2020 02:44, L.P.H. van Belle via samba wrote:
> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941493
> https://bugzilla.samba.org/show_bug.cgi?id=14344
>
These appear they could be related to the issue I'm encountering.
So I did some additional testing and discovered something interesting, but
first some background:
I previously mentioned that part of my initial
2017 Dec 23
5
[Bug 2815] New: please set KRB5CCNAME to collection
https://bugzilla.mindrot.org/show_bug.cgi?id=2815
Bug ID: 2815
Summary: please set KRB5CCNAME to collection
Product: Portable OpenSSH
Version: 7.4p1
Hardware: amd64
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: Kerberos support
Assignee: unassigned-bugs
2018 Sep 22
2
Printing via SMB-Kerberos no longer works
> Sent: Saturday, September 22, 2018 at 12:08 PM
> From: "Robert Schetterer via samba" <samba at lists.samba.org>
> To: samba at lists.samba.org
> Subject: Re: [Samba] Printing via SMB-Kerberos no longer works
>
> Am 22.09.2018 um 09:49 schrieb Alex Persson via samba:
> > After upgrading from Ubuntu 16.04 to 18.04 printing via SMB-Kerberos no longer works
2020 Sep 16
3
smbclient ignores configured kerberos ccache when using krb5-user on ubuntu/debian
I know, and i have him the "samba" solution, because ...
I dont know sssd also.
And i dont get the fuss on samba+winbind or samba+sssd
I have 3 services running minimal : samba winbind user-homes.automount
Everything works as it should.
I hope, and i'll add the note here also.
NOTE !
My packages are NOT sssd compliant, you need to recompile SSSD yourselfs agains my samba
2020 Sep 15
4
smbclient ignores configured kerberos ccache when using krb5-user on ubuntu/debian
Hello all.
I'm encountering an issue where smbclient seemingly ignores the kerberos
ccache as configured in krb5.conf when using "krb5-user" as the kerberos
package and will instead always default to using "FILE:/tmp/krb5cc_uid".
I tested each valid default ccache name type but smbclient completely
ignores whatever is set as the "default_ccache_name" in the conf
2018 Sep 22
1
Printing via SMB-Kerberos no longer works
Robert Schetterer wrote:
> Alex Persson wrote:
>> Robert Schetterer wrote:
>>> Alex Persson wrote:
>>>> After upgrading from Ubuntu 16.04 to 18.04 printing via SMB-Kerberos no longer works (printing still works in 18.04 when I print via SMB but I don't want to have the password stored in clear text in /usr/lib/cups/backend/smb).
>>>>
>>>>
2016 Jan 27
6
NT_STATUS_CONNECTION_REFUSED
On 27 January 2016 at 08:24, Rowland penny <rpenny at samba.org> wrote:
> On 26/01/16 20:54, Henry McLaughlin wrote:
>
>> [root at centos7member ~]# net rpc rights list accounts
>> -U'TESTING\administrator'
>> Enter TESTING\administrator's password:
>> Could not connect to server 127.0.0.1
>> Connection failed: NT_STATUS_CONNECTION_REFUSED
2015 Jun 18
3
wbinfo fails: Error looking up domain users
Thanks Rowland,
I am trying to setup an AD member server. I followed the wiki
(https://wiki.samba.org/index.php/Setup_a_Samba_AD_Member_Server). I am
on Fedora 21.
The domain join succeeded
But wbinfo fails:
$ wbinfo -u
Error looking up domain users
I tried to increase windbind log verbosity to 10, but I can see no trace
when issuing wbinfo:
/etc/smb.conf
log level = winbind:10
2017 Feb 10
5
cifs-utils: regression in (mulituser?) mounting 'CIFS VFS: Send error in SessSetup = -126'
On Fri, 2017-02-10 at 11:15 -0600, Chad William Seys wrote:
> Hi Jeff,
>
> > So we have a default credcache for the user for whom we are operating
> > as, but we can't get the default principal name from it. My guess is
> > that it's not finding the
>
> This mount is run by root UID=0 and seems to be find that credential
> cache without problem (earlier
2016 Jan 27
2
NT_STATUS_CONNECTION_REFUSED
On 27 January 2016 at 17:40, mathias dufresne <infractory at gmail.com> wrote:
> Hi,
>
> Samba DC generates a krb5.conf into private directory, where the database
> is hold.
>
> Its content should be that:
> [libdefaults]
> default_realm = SAMBA.DOMAIN.TLD
> dns_lookup_realm = false
> dns_lookup_kdc = true
>
> Should only as I get
2016 Oct 25
3
Samba 4.5 y opensuse42.1
Hi friends:
I was installed Samba4 ver 4.5 on openSuSE 42.1 Leap, the smb.conf is:
# Global parameters
[global]
netbios name = SERVERDOM
realm = POLRMVAR.MTZ.SLD.CU
workgroup = POLRMVAR
dns forwarder = 10.44.0.5
server role = active directory domain controller
server services = s3fs, rpc, nbt, wrepl, ldap, cldap, kdc, drepl,
winbind, ntp_signd, kcc
[netlogon]
2016 Jul 26
4
NT_STATUS_INTERNAL_ERROR
Dear Rowland,
Follows the requested information:DC Primary: Windows 2008 R2Secondary DC: Samba 4.4.5
Content smb.conf
[global] #bind interfaces only = Yes interfaces = lo eno16777984 netbios name = SRV14 realm = DOMAIN.LOCAL server services = s3fs, rpc, nbt, wrepl, ldap, cldap, kdc, drepl, winbindd, ntp_signd, kcc, dnsupdate, dns workgroup = DOMAIN
2018 Dec 11
3
Authentification against kerberos / sssd
On 11.12.18 15:23, Rowland Penny via samba wrote:
> On Tue, 11 Dec 2018 15:09:39 +0100
> tseegerkrb via samba <samba at lists.samba.org> wrote:
>
>> Hello list,
>>
>> a quick question. Right now I have a combination of MIT Kerberos,
>> OpenLDAP and SSSD for authenticating my users. Is there a way that
>> Samba can use this setup to perform user
2020 Oct 01
2
Kerberos ticket lifetime
On 10/1/2020 8:34 AM, Rowland penny via samba wrote:
> On 01/10/2020 13:30, Jason Keltz via samba wrote:
>> On 10/1/2020 8:28 AM, Rowland penny via samba wrote:
>>
>>> On 01/10/2020 13:17, Jason Keltz via samba wrote:
>>>> So why is it that winbind renews the ticket on the original system,
>>>> but on the system that I ssh to, it does not.
2016 Jan 27
2
NT_STATUS_CONNECTION_REFUSED
On 27 January 2016 at 20:27, Rowland penny <rpenny at samba.org> wrote:
> On 27/01/16 01:03, Henry McLaughlin wrote:
>
>> On 27 January 2016 at 08:24, Rowland penny <rpenny at samba.org> wrote:
>>
>> On 26/01/16 20:54, Henry McLaughlin wrote:
>>>
>>> [root at centos7member ~]# net rpc rights list accounts
>>>>
2015 Jul 02
2
Secondary groups not recognized by Samba
I am running Samba 4.1.12 with SSSD 1.12.2 on RHEL 7.1. I have joined my
system to a Win 2008r2 domain. I have added the necessary unix attributes
to all relevant users and groups. When I add a domain group to a
directory, either as the primary group or as an ACL, I can access the share
locally from the server, but cannot access the share from a Windows system
via the SMB share. If I change