similar to: samba 4.4.2 freeradius authentication with ntlm_auth

Displaying 20 results from an estimated 1000 matches similar to: "samba 4.4.2 freeradius authentication with ntlm_auth"

2016 Apr 15
1
samba 4.4.2 freeradius authentication with ntlm_auth
> On Apr 15, 2016, at 15:06 , Andrew Bartlett <abartlet at samba.org> wrote: > > > Yes, this really, really sucks. MSCHAPv2 is NTLM, not NTLMv2 based. > This is despite NTLMv2 being around when they 'designed' this > mechanism. Sadly no attempt has been made to somehow get an MSCHAPv3 > in that uses NTLMv2. > > On Windows, setting a special flag
2016 Apr 15
0
samba 4.4.2 freeradius authentication with ntlm_auth
On Fri, 2016-04-15 at 14:06 +0300, barış tombul wrote: > Hi; > Samba team say "It is recommended that administrators set these > additional > options, if compatible with their network environment:" > > > ntlm auth = no > > > I use samba with FreeRadius. > > > I configure "ntlm_ auth = no" but freeradius users not connected to >
2013 Feb 22
6
Samba 4 and freeradius
Hi, My goal is to make use of samba 4 and freeradius to authenticate user to use wifi network (WPA2 enterprise). The setup is to setup Samba 4.0.3 in machine A and setup freeradius in machine B. By reading: Document A: http://wiki.samba.org/index.php/Samba4/beyond Document B: https://wiki.samba.org/index.php/Samba4/HOWTO/Virtual_Private_Network Document C:
2018 Sep 07
4
NTLM auth, better on a DC or on a DM?
Probably is a stupid question, but... I need to implement some 'NTLM auth' (in squid and MSCHAPv2/PEAP on freeradius). It is better to install squid/freeradius in the same host of a DC, or don't bother at all so they can be installed also on a DM? Thanks. -- dott. Marco Gaiarin GNUPG Key ID: 240A3D66 Associazione ``La Nostra Famiglia''
2018 Mar 27
5
ODP: Re: freeradius + NTLM + samba AD 4.5.x
Hello, I can definately confirm that it's working. My basic setup is: 1) Samba 4.7.6 AD DC (2 of them), compiled from source, on centos 7 2) Freeradius 3.0.13 + samba 4.6.2 as domain member, packages straight from centos repo. // I  tested also on freeradius 3.0.14 and samba 4.7.x smb.conf on the DC is pretty basic, most important is obviously in [globall]:         ntlm auth =
2019 Aug 30
6
Samba 4.10.7 + freeradius 3.0.17 +ntlm_auth - Debian buster
Hai, It does not happen often but yes, i also need some help as i cant know everything also and im new with freeradius. Im working on a configuration for samba member + freeradius with ntlm_auth. Why ntlm_auth, because the next one is kerberos and ldap auth to configure.. I want to have some fallback options here and you have to start somewhere. This is running on my new proxy/gateway
2018 Mar 27
2
ODP: Re: freeradius + NTLM + samba AD 4.5.x
ok, tested it, and it works. so to summarize: on samba ad 4.7.x  in smb.conf "ntlm auth" is set to "mschapv2-and-ntlmv2-only" fr + samba domain member (4.6 and 4.7) in mods-available/mschap you have to add to ntlm_auth --allow-mschapv2 to the whole string OR just use winbind method, which sets correct flag without explicitly adding it. with those settings ntlmv1 is blocked
2018 Mar 26
3
freeradius + NTLM + samba AD 4.5.x
Also I just facepalmed, as I double checked smb.conf right after sending mail, and in samba 4.7 there are new options available for "ntlm auth", as stated in docs: |mschapv2-and-ntlmv2-only| - Only allow NTLMv1 when the client promises that it is providing MSCHAPv2 authentication (such as the |ntlm_auth| tool). So that is is I suppose that special "flag" that is used by
2018 Mar 26
3
freeradius + NTLM + samba AD 4.5.x
Ok, I finally could try it out, and it seems to actually work, but You need samba 4.7 on all machines, not only AD, but also server with freeradius. I didn't get a chance to test it locally, that is samba AD + freeradius on the same server. Setup: 4.7.6 AD server and 4.6.2 samba member + freeradius didn't work (got simple "nt_status_wrong_password") but: 4.7.6 AD and 4.7.1
2018 Mar 26
4
freeradius + NTLM + samba AD 4.5.x
Hi, we have updated our samba AD domain from 4.4.x to 4.5.x. The release notes for 4.5.0 included  "NTLMv1 authentication disabled by default". So we had to enable it to get our radius (freeradius) server working (for 802.1x). What would be the best way to change the freeradius configuration in such a way, that we can disable NTLMv1 again. The radius server is used for WLAN
2017 Oct 17
3
ntlm_auth and SMBv2/v3
Hello Andrew, Do you plan to release the patch for "ntlm auth = mschapv2-only" option soon ? We need this on order to use freeradius in a "more safe" scenario than with "ntlm auth = yes" Best Regard, Lulzim KELMENI Direction des Systèmes d'Information Mairie de Saint-Ouen Le 08/06/2017 21:36, Andrew Bartlett via samba a écrit : > On Thu, 2017-06-08 at
2018 Mar 26
1
freeradius + NTLM + samba AD 4.5.x
It is an issue that I myself would also like to solve. I found multiple threads in samba and freeradius mailing lists. It seems that every couple of months there is question like this either here on FR mailing list and all point down to the same issue, that is: freeradius uses ntlm_auth (even when using winbind with newer freeradius versions, it also in the end uses ntlm_auth). And since
2018 Mar 26
2
freeradius + NTLM + samba AD 4.5.x
Hello, I've done some further testing, and I have to correct myself. I was (kind of obviously as I think about it) wrong about samba on the freeradius server requiring v. 4.7. What makes all the difference is the method used by mschap. Traditionally in freeradius in mods-available/mschap you'll use something like: ntlm_auth = "/path/to/ntlm_auth --request-nt-key
2017 May 29
2
ntlm_auth with freeradius
On 29 May 2017 12:32 >When running 'winbindd -SFd5', I see a little more of the problem after I run my two ntlm_auth commands > one after the other. I believe the 'crap' part is an acronym for 'Challenge Response > Authentication Protocol', so why would it be failing? Edit2: wbinfo -a tim.odriscoll%<mypass> works perfectly, with the winbindd debug logs
2019 Sep 28
5
problems after migrating NT domain to AD (samba 4.7.x)
Dear List, My domain +/- works, so I try to fix rest services based on domain NT/AD.... I use WiFi authorization with PEAP/MSCHAPv2 + freeradius (before migration it works). And after migration autorization does not work. Freeradius server is on samba domain member. So i check domain connectivity: [root at see-you-later samba]# net ads testjoin Join is OK [root at see-you-later samba]#
2023 Apr 03
2
ntlm_auth and freeradius
Op 03-04-2023 om 16:05 schreef Tim ODriscoll via samba: > Dear All, > > I'm trying to setup FreeRADIUS to authenticate a machine account to grant access to wifi for domain-connected machines. I think I've got the GPO's set up properly and the CA deployed to the clients, as I'm not getting any errors there. > > The errors I'm getting are to do with ntlm_auth not
2023 Apr 12
2
Fwd: ntlm_auth and freeradius
Hi Alexander, I'm terribly sorry. We didnt have the "ntlm auth" parameter configured on the DCs at all. I added it and it just works. Thanks for your help. Now I just need to figure out how I can make WLAN-specific LDAP-Group authentication. e. g. production WLAN needs LDAP group "wlan_production" and management WLAN needs the "wlan_management" group. I
2016 Oct 10
5
SAMBA 4.5.0
Hello Helper, i found this bug report: https://bugzilla.samba.org/show_bug.cgi?id=12252 At this time i have a samba 4.1.6 Domain Controller and Freeradius-Server. The authentication works pretty well in 4.1.6. Now I built a new Domain Controller from source, version 4.5.0. The configuration like 4.1.6, but now I have an authentication issue. There is no helpfull information in freeradius log
2017 Feb 04
3
Server 2012 functional level for Samba v4.6?
Windows Server 2008 R2 Enterprise - mainstream support end-date: 1/13/2015 - extended support end-date: 1/14/2020 samba -V Version 4.6.0rc2 samba-tool domain level show ldb_wrap open of secrets.ldb Domain and forest function level for domain 'DC=facility,DC=local' Forest function level: (Windows) 2008 R2 Domain function level: (Windows) 2008 R2 Lowest function level of a DC:
2017 Jun 08
4
ntlm_auth and SMBv2/v3
hai,   Please keep it mailing to the list, this way is shows up of others also. A workaround for disabling SMBv1, you can make your server less secure but thats not what i would do. Setting these to enable NTLM v1 again. lanman auth = yes ntlm auth = yes raw NTLMv2 auth = yes I think also this is more a question for the free raduis list, but i would to for a ldap(s) setup. just dont mixup