Displaying 20 results from an estimated 3000 matches similar to: "NTLM, MSCHAPv2, squid & freeradius..."
2018 Mar 27
2
ODP: Re: freeradius + NTLM + samba AD 4.5.x
ok, tested it, and it works.
so to summarize:
on samba ad 4.7.x in smb.conf "ntlm auth" is set to "mschapv2-and-ntlmv2-only"
fr + samba domain member (4.6 and 4.7) in mods-available/mschap you have to add to ntlm_auth --allow-mschapv2 to the whole string OR just use winbind method, which sets correct flag without explicitly adding it.
with those settings ntlmv1 is blocked
2018 Mar 26
2
freeradius + NTLM + samba AD 4.5.x
Hello,
I've done some further testing, and I have to correct myself.
I was (kind of obviously as I think about it) wrong about samba on the
freeradius server requiring v. 4.7. What makes all the difference is the
method used by mschap.
Traditionally in freeradius in mods-available/mschap you'll use
something like:
ntlm_auth = "/path/to/ntlm_auth --request-nt-key
2018 Mar 27
5
ODP: Re: freeradius + NTLM + samba AD 4.5.x
Hello,
I can definately confirm that it's working.
My basic setup is:
1) Samba 4.7.6 AD DC (2 of them), compiled from source, on centos 7
2) Freeradius 3.0.13 + samba 4.6.2 as domain member, packages straight
from centos repo. // I tested also on freeradius 3.0.14 and samba 4.7.x
smb.conf on the DC is pretty basic, most important is obviously in
[globall]:
ntlm auth =
2023 Apr 03
2
ntlm_auth and freeradius
Op 03-04-2023 om 16:05 schreef Tim ODriscoll via samba:
> Dear All,
>
> I'm trying to setup FreeRADIUS to authenticate a machine account to grant access to wifi for domain-connected machines. I think I've got the GPO's set up properly and the CA deployed to the clients, as I'm not getting any errors there.
>
> The errors I'm getting are to do with ntlm_auth not
2023 Apr 03
1
ntlm_auth and freeradius
Dear All,
I'm trying to setup FreeRADIUS to authenticate a machine account to grant access to wifi for domain-connected machines. I think I've got the GPO's set up properly and the CA deployed to the clients, as I'm not getting any errors there.
The errors I'm getting are to do with ntlm_auth not authenticating my machine account. Everything looks OK (to me) on the command
2019 Aug 30
6
Samba 4.10.7 + freeradius 3.0.17 +ntlm_auth - Debian buster
Hai,
It does not happen often but yes, i also need some help as i cant know everything also and im new with freeradius.
Im working on a configuration for samba member + freeradius with ntlm_auth.
Why ntlm_auth, because the next one is kerberos and ldap auth to configure..
I want to have some fallback options here and you have to start somewhere.
This is running on my new proxy/gateway
2023 Apr 03
2
[EXTERNAL] Fwd: ntlm_auth and freeradius
> I guess we have to look at the conf files then, first these two:
Thank you for the config file snippets. I can confirm mine were almost identical, so I've tweaked them so that they are now exactly the same as yours except for the "--require-membership-of=example\authorization_groupname" line in ntlm_auth.
Unfortunately it's still erroring out:
(7) mschap: Creating
2018 Mar 26
3
freeradius + NTLM + samba AD 4.5.x
Ok, I finally could try it out, and it seems to actually work, but You
need samba 4.7 on all machines, not only AD, but also server with
freeradius. I didn't get a chance to test it locally, that is samba AD +
freeradius on the same server.
Setup: 4.7.6 AD server and 4.6.2 samba member + freeradius didn't work
(got simple "nt_status_wrong_password")
but: 4.7.6 AD and 4.7.1
2019 Oct 21
4
Samba4 and Freeradius
Hello,
i've configured a new freeradius server for WLAN authentication. My
radius server is a domain member on my samba 4.7.12 ADDC. For my mschap
configuration i followd this guide:
https://wiki.samba.org/index.php/Authenticating_Freeradius_against_Active_Directory.
The auth works! I can configure ntlm_auth in two differents way?
ntlm_auth = "/path/to/ntlm_auth*--allow-mschapv2*
2023 Apr 03
2
Fwd: ntlm_auth and freeradius
Op 03-04-2023 om 16:05 schreef Tim ODriscoll via samba:
> Dear All,
>
> I'm trying to setup FreeRADIUS to authenticate a machine account to grant access to wifi for domain-connected machines. I think I've got the GPO's set up properly and the CA deployed to the clients, as I'm not getting any errors there.
>
> The errors I'm getting are to do with ntlm_auth not
2003 Oct 31
2
MSCHAPv2 microsoft client/linux/Active Directory
Hello all,
I was not able to find much on this in the archives so I hope someone
can help
Me with this.
Can samba 3.x help the authentication of a Microsoft client
authenticating with
MSCHAPv2 passwords to my linux box which we use to authenticate a user
stored
on a Microsoft Active Directory server. The authentication request
comes in through
RADIUS which I can convert to LDAP,but that
2018 Mar 26
3
freeradius + NTLM + samba AD 4.5.x
Also I just facepalmed, as I double checked smb.conf right after sending
mail, and in samba 4.7 there are new options available for "ntlm auth",
as stated in docs:
|mschapv2-and-ntlmv2-only| - Only allow NTLMv1 when the client promises
that it is providing MSCHAPv2 authentication (such as the |ntlm_auth| tool).
So that is is I suppose that special "flag" that is used by
2023 Apr 04
2
Fwd: ntlm_auth and freeradius
> You said earlier that you have set ntlm auth = mschapv2-and-ntlmv2-only
Yes, I found that here:
https://wiki.samba.org/index.php/Authenticating_Freeradius_against_Active_Directory
> This means to reject NTLMv1, which MSCHAPv2 is cryptographically, unless the client makes special pleading that it used MSCHAPv2 with it's client.
> This is related to the missing ntlm_auth option
2023 Apr 03
2
[EXTERNAL] Fwd: ntlm_auth and freeradius
On Mon, 2023-04-03 at 15:08 +0000, Tim ODriscoll via samba wrote:
> Unfortunately it's still erroring out:
> (7) mschap: Creating challenge hash with username: host/SL-6S4BBS3.MYDOMAIN.co.uk
> (7) mschap: Client is using MS-CHAPv2
Is this set as a UPN (with the realm appended) on the user?
--
Andrew Bartlett (he/him) https://samba.org/~abartlet/
Samba Team Member (since 2001)
2023 Apr 04
1
Fwd: ntlm_auth and freeradius
On Mon, 2023-04-03 at 15:08 +0000, Tim ODriscoll via samba wrote:
Unfortunately it's still erroring out:
(7) mschap: Creating challenge hash with username: host/SL-6S4BBS3.MYDOMAIN.co.uk
(7) mschap: Client is using MS-CHAPv2
> Is this set as a UPN (with the realm appended) on the user?
I don't see any UPN's in my AD record, only SPNs - unless I misunderstand you?
I've run
2023 Apr 04
1
Fwd: ntlm_auth and freeradius
On Tue, 2023-04-04 at 07:55 +0000, Tim ODriscoll wrote:
> On Mon, 2023-04-03 at 15:08 +0000, Tim ODriscoll via samba wrote:
>
>
>
>
> > Unfortunately it's still erroring out:
> > (7) mschap: Creating challenge hash with username: host/SL-
> > 6S4BBS3.MYDOMAIN.co.uk
> > (7) mschap: Client is using MS-CHAPv2
>
>
>
> > Is this set as a
2018 Mar 28
0
ODP: Re: freeradius + NTLM + samba AD 4.5.x
Hi,
thank you very much for testing everything out. Great work!
One question: passchange - which application are working with passchange
on radius ?
In the moment every user with an expired password is NOT able to use
services using radius
for authentication (WLAN,VPN). Is there any documentation available ?
Bye, Peer
On 27.03.2018 22:40, Kacper Wirski via samba wrote:
> Hello,
>
>
2023 Apr 12
1
Fwd: ntlm_auth and freeradius
Hello Alexander,
thanks Alexander for these configuration snippets.
Which version of Samba are you using? Is this on debian bullseye? Is the
FreeRADIUS server installed on a DC or on a Domain Member? (I just
tested the latter).
is "ntlm auth = yes" OK for the DCs and the domain member or does it
have to be "mschapv2-and-ntlmv2-only" for all servers (DCs + Member)? It
2023 Apr 06
1
Fwd: ntlm_auth and freeradius
I can share my notes, we authenticate UniFi clients via Freeradius against Samba AD. We also check group membership which you might or might not need:
## 4 FreeRADIUS
### 4.1 Basics
```bash
apt install freeradius freeradius-ldap freeradius-utils
# create new DH-params
openssl dhparam -out /etc/freeradius/3.0/certs/dh 2048
```
### 4.2 Configure Authentication
- modify mschap to use winbind,
2023 Apr 12
1
Fwd: ntlm_auth and freeradius
Hi Matthias,
we?re using Debian Bullseye with the backports repo. So version is a mixture of
- Samba version 4.17.3-Debian
- Samba version 4.17.7-Debian
We?ve installed it directly on the DC?s as well.
In my opinion using "ntlm auth = yes? should be fine.
Did you try using a simple RADIUS secret? In my experience long secrets or ones containing special characters don?t work very well. I