Hello all,
A problem has been noted on a server upgraded (with migration
of configs) from older SXCE snv_117 into OpenIndiana oi_151a8
regarding kCIFS support: While the old installations performed
quite well as a CIFS server in the domain, serving also for some
clients that are not part of the domain (however, with Windows
logins and passwords on the standalone PCs being identical to
those in the domain), the new installation (with old configs
including old idmap setup database files) often refuses access
at least for these stand-alone machines because it does not
recognize login attempts as authenticated:
Dec 30 10:19:27 thumper smbsrv: [ID 138215 kern.notice] NOTICE:
smbd[THUMPER\nobody]: distribs access denied: guest disabled
This happens even if I redefine the password for users locally
in OI with passwd (the pam.conf patch for smb is applied).
The accounts who need access to the fileserver part are defined
locally (/etc/passwd et al) without AD LDAP clientship and stuff.
Possibly, this happens because the Windows client presents the
username prepended with its own local host name (PC\username)
in absence of the domain membership. Possibly, then it tries
"Guest" which is disabled.
However, if the user waits until after the timeout and types
his login as "THUMPER\username", the access is granted.
So, the current configs are as follows:
# grep -v '#' /etc/pam.conf
login auth requisite pam_authtok_get.so.1
login auth required pam_dhkeys.so.1
login auth required pam_unix_cred.so.1
login auth required pam_unix_auth.so.1
login auth required pam_dial_auth.so.1
rlogin auth sufficient pam_rhosts_auth.so.1
rlogin auth requisite pam_authtok_get.so.1
rlogin auth required pam_dhkeys.so.1
rlogin auth required pam_unix_cred.so.1
rlogin auth required pam_unix_auth.so.1
krlogin auth required pam_unix_cred.so.1
krlogin auth required pam_krb5.so.1
rsh auth sufficient pam_rhosts_auth.so.1
rsh auth required pam_unix_cred.so.1
krsh auth required pam_unix_cred.so.1
krsh auth required pam_krb5.so.1
ktelnet auth required pam_unix_cred.so.1
ktelnet auth required pam_krb5.so.1
ppp auth requisite pam_authtok_get.so.1
ppp auth required pam_dhkeys.so.1
ppp auth required pam_unix_cred.so.1
ppp auth required pam_unix_auth.so.1
ppp auth required pam_dial_auth.so.1
gdm-autologin auth required pam_unix_cred.so.1
gdm-autologin auth sufficient pam_allow.so.1
other auth requisite pam_authtok_get.so.1
other auth required pam_dhkeys.so.1
other auth required pam_unix_cred.so.1
other auth required pam_unix_auth.so.1
passwd auth required pam_passwd_auth.so.1
cron account required pam_unix_account.so.1
cups account required pam_unix_account.so.1
gdm-autologin account sufficient pam_allow.so.1
other account requisite pam_roles.so.1
other account required pam_unix_account.so.1
other session required pam_unix_session.so.1
other password required pam_dhkeys.so.1
other password requisite pam_authtok_get.so.1
other password requisite pam_authtok_check.so.1
other password required pam_authtok_store.so.1
other password required pam_smb_passwd.so.1 nowarn
# idmap list
add winname:Guest@thumper unixuser:nobody
add winuser:Administrator@thumper unixuser:root
add wingroup:*@domain.ru unixgroup:*
add "wingroup:Domain [email protected]" unixgroup:staff
add "wingroup:Domain [email protected]" unixgroup:sysadmin
add wingroup:[email protected] unixgroup:winsystem
add wingroup:Administrators@BUILTIN unixgroup:winadmins-builtin
add wingroup:Network unixgroup:winnet
add "wingroup:Authenticated Users" unixgroup:winusers-auth
add "wingroup:Schema [email protected]" unixgroup:winadmins-schema
add "wingroup:Enterprise [email protected]"
unixgroup:winadmins-enterprise
add winuser:[email protected] unixuser:jim
add "wingroup:Power Users@BUILTIN" unixgroup:winusers-power
add winuser:*@domain.ru unixuser:*
Adding another mapping that would match non-domain users to the
accounts defined in OI fails, possibly because the second pattern
is the same:
# idmap add 'winuser:*' 'unixuser:*'
add winuser:* unixuser:*
Error commiting transaction (Duplicate rule or conflicts with an
existing Unix to Windows name-based rule)
# idmap add 'winuser:*@thumper' 'unixuser:*'
add winuser:*@thumper unixuser:*
Error commiting transaction (Duplicate rule or conflicts with an
existing Unix to Windows name-based rule)
So... are there any ideas what can differ between the old and new
setups in a way that old works and new doesn't? Did the software
logic change somehow, or rather some config tweak was not migrated?
Thanks,
//Jim Klimov
_______________________________________________
OpenIndiana-discuss mailing list
[email protected]
http://openindiana.org/mailman/listinfo/openindiana-discuss