freeradius and ntlm_auth howto

Jonathan De Graeve Jonathan.De.Graeve at imelda.be
Thu Oct 26 16:41:05 CEST 2006


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

The debugging output is exactly saying whats wrong

Exec-Program output: winbind client not authorized to use winbindd_pam_auth_crap.  Ensure permissions on /var/cache/samba/winbindd_privileged are set correctly.                                              (0xc0000022)

This dir should be readable by freeradius AND winbind. I thought 750 would work

J.

- --
Jonathan De Graeve
IMELDA vzw
Informatica Dienst
Network System Engineer
jonathan.de.graeve at imelda.be
+32(0)15/50.52.98

> -----Oorspronkelijk bericht-----
> Van: freeradius-users-
> bounces+jonathan.de.graeve=imelda.be at lists.freeradius.org
> [mailto:freeradius-users-
> bounces+jonathan.de.graeve=imelda.be at lists.freeradius.org] Namens
> Stieven.Struyf at komatsu.eu
> Verzonden: donderdag 26 oktober 2006 16:24
> Aan: freeradius-users at lists.freeradius.org
> Onderwerp: freeradius and ntlm_auth howto
> 
> 
> All,
> I am trying to authenticate my wifi users via our AD. I'm finding bits and
> pieces on the internet to configure things, but no completely usable
> howto.
> Can someone of the users look at the ouput below and point me to the
> correct solution/howto?
> 
> I setup smb.conf,krb5.conf and freeradius. I joined the server to the
> domain and tested the connection with ntlm_auth:
> [root at belx11ke ~]# /usr/bin/ntlm_auth --request-nt-key --username=sstruyf
> --domain=KMT-EU.KMTG.NET
> password:
> NT_STATUS_OK: Success (0x0)
> [root at belx11ke ~]#
> 
> rights of the winbind pipe:
> ls -l /var/cache/samba/winbindd_privileged
> total 0
> srwxrwxrwx  1 root root 0 Oct 25 14:46 pipe
> 
> below is the debug output of freeradius
> 
>   Processing the authenticate section of radiusd.conf
> modcall: entering group authenticate for request 7
>   rlm_eap: Request found, released from the list
>   rlm_eap: EAP/peap
>   rlm_eap: processing type peap
>   rlm_eap_peap: Authenticate
>   rlm_eap_tls: processing TLS
>   eaptls_verify returned 7
>   rlm_eap_tls: Done initial handshake
>   eaptls_process returned 7
>   rlm_eap_peap: EAPTLS_OK
>   rlm_eap_peap: Session established.  Decoding tunneled attributes.
>   rlm_eap_peap: EAP type mschapv2
>   rlm_eap_peap: Tunneled data is valid.
>   PEAP: Got tunneled EAP-Message
>         EAP-Message =
> 0x020900521a0209004d3137d2b9533b5dbce9ca720a00d56208c30000
> 0000000000008a0b7468748de41ff9fc510e9cc7afb6e1f9faaf0d9a9972004b4d542d4555
> 2e4b4d54472e4e45545c73737472757966
>   PEAP: Setting User-Name to KMT-EU.KMTG.NET\sstruyf
>   PEAP: Adding old state with a4 c3
>   PEAP: Sending tunneled request
>         EAP-Message =
> 0x020900521a0209004d3137d2b9533b5dbce9ca720a00d56208c30000
> 0000000000008a0b7468748de41ff9fc510e9cc7afb6e1f9faaf0d9a9972004b4d542d4555
> 2e4b4d54472e4e45545c73737472757966
>         FreeRADIUS-Proxied-To = 127.0.0.1
>         User-Name = "KMT-EU.KMTG.NET\\sstruyf"
>         State = 0xa4c337a92357e8d90a5f8c64b37d2df1
>   Processing the authorize section of radiusd.conf
> modcall: entering group authorize for request 7
>   modcall[authorize]: module "preprocess" returns ok for request 7
>   modcall[authorize]: module "mschap" returns noop for request 7
>     rlm_realm: No '@' in User-Name = "KMT-EU.KMTG.NET\sstruyf", looking up
> realm   NULL
>     rlm_realm: No such realm "NULL"
>   modcall[authorize]: module "kmt-eu.kmtg.net" returns noop for request 7
>     rlm_realm: Looking up realm "KMT-EU.KMTG.NET" for User-Name = "KMT-
> EU.KMTG.NET\sstruyf"
>     rlm_realm: Found realm "KMT-EU.KMTG.NET"
>     rlm_realm: Adding Stripped-User-Name = "sstruyf"
>     rlm_realm: Proxying request from user sstruyf to realm KMT-EU.KMTG.NET
>     rlm_realm: Adding Realm = "KMT-EU.KMTG.NET"
>     rlm_realm: Authentication realm is LOCAL.
>   modcall[authorize]: module "ntdomain" returns noop for request 7
>   rlm_eap: EAP packet type response id 9 length 82
>   rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
>   modcall[authorize]: module "eap" returns updated for request 7
>     users: Matched sstruyf at 98
>   modcall[authorize]: module "files" returns ok for request 7
> modcall: group authorize returns updated for request 7
>   rad_check_password:  Found Auth-Type EAP
> auth: type "EAP"
>   Processing the authenticate section of radiusd.conf
> modcall: entering group authenticate for request 7
>   rlm_eap: Request found, released from the list
>   rlm_eap: EAP/mschapv2
>   rlm_eap: processing type mschapv2
>   Processing the authenticate section of radiusd.conf
> modcall: entering group Auth-Type for request 7
>   rlm_mschap: No User-Password configured.  Cannot create LM-Password.
>   rlm_mschap: No User-Password configured.  Cannot create NT-Password.
>   rlm_mschap: NT Domain delimeter found, should we have enabled
> with_ntdomain_hack?
>   rlm_mschap: Told to do MS-CHAPv2 for KMT-EU.KMTG.NET\sstruyf with NT-
> Password
> radius_xlat: Running registered xlat function of module mschap for string
> 'Challenge'
>  mschap2: 95
>   rlm_mschap: NT Domain delimeter found, should we have enabled
> with_ntdomain_hack?
> radius_xlat: Running registered xlat function of module mschap for string
> 'NT-Response'
> radius_xlat:  '/usr/bin/ntlm_auth --request-nt-key --username=sstruyf --
> challeng e=7b634e5c9dd73ddc --nt-
> response=8a0b7468748de41ff9fc510e9cc7afb6e1f9faaf0d9a9972'
> Exec-Program: /usr/bin/ntlm_auth --request-nt-key --username=sstruyf --
> challenge=7b634e5c9dd73ddc --nt-
> response=8a0b7468748de41ff9fc510e9cc7afb6e1f9faaf0d9a9972
> Exec-Program output: winbind client not authorized to use
> winbindd_pam_auth_crap.  Ensure permissions on
> /var/cache/samba/winbindd_privileged are set correctly.
> (0xc0000022)
> Exec-Program-Wait: plaintext: winbind client not authorized to use
> winbindd_pam_auth_crap.  Ensure permissions on
> /var/cache/samba/winbindd_privileged are set correctly. (0xc0000022)
> Exec-Program: returned: 1
>   rlm_mschap: External script failed.
>   rlm_mschap: FAILED: MS-CHAP2-Response is incorrect
>   modcall[authenticate]: module "mschap" returns reject for request 7
> modcall: group Auth-Type returns reject for request 7
>   rlm_eap: Freeing handler
>   modcall[authenticate]: module "eap" returns reject for request 7
> modcall: group authenticate returns reject for request 7
> auth: Failed to validate the user.
> Login incorrect: [KMT-EU.KMTG.NET\\sstruyf/<no User-Password attribute>]
> (from client localhost port 0)
>   Processing the post-auth section of radiusd.conf
> modcall: entering group Post-Auth-Type for request 7
> 
> Stieven Struyf
> M.I.S. Division - System Operations
> Komatsu Europe International NV
> Mechelsesteenweg 586
> B-1800 Vilvoorde
> Stieven.Struyf at komatsu.eu
> Tel. +32 (0)2 2552551

-----BEGIN PGP SIGNATURE-----
Version: 9.5.0 (Build 1202)

wsBVAwUBRUDJDNjY2X/BrZGJAQjchQf/QUKfxpmDYdPgui8BqBOLGnp9SeO/v97+
QJZa0iCfSPX7Sr2GoXq+lK4s5a+vFnyqTm2s1kHwCcZif4PaUAjmXf0kjsPiV4X9
IIeImenaGNnS8iEFmIWEaP7WnzrB8/rPAeA1xnSyML06g7ejyMK23b50NwcWUyrf
lnPPrGxLLOu1FUg94NI28iVtwLs9eqoHKyAKddaw42m9IXomuc7rZDBYBRO6bNvv
/3E9TZMLszpe2oy6SEIItNyx9qjZTZtP2K1KSBS1ING9rI6EIYL505aQ9OPYzj9t
HsP0HnpdvZJL8D0EtcSxzzoQLuC5wPzBjlWmGUGtsDY/8Wil9fx07A==
=wrIA
-----END PGP SIGNATURE-----





More information about the Freeradius-Users mailing list