[Samba] ODP: Re: freeradius + NTLM + samba AD 4.5.x
Rowland Penny
rpenny at samba.org
Tue Mar 27 20:50:30 UTC 2018
On Tue, 27 Mar 2018 22:40:13 +0200
Kacper Wirski via samba <samba at lists.samba.org> wrote:
> Hello,
>
> I can definately confirm that it's working.
>
> My basic setup is:
>
> 1) Samba 4.7.6 AD DC (2 of them), compiled from source, on centos 7
>
> 2) Freeradius 3.0.13 + samba 4.6.2 as domain member, packages
> straight from centos repo. // I tested also on freeradius 3.0.14 and
> samba 4.7.x
>
> smb.conf on the DC is pretty basic, most important is obviously in
> [globall]:
>
> ntlm auth = mschapv2-and-ntlmv2-only
>
> On server with freeradius + samba 4.6.2:
>
> machine is added to AD using samba with net ads join.
>
> Most important configuration to make mschapv2 only with ntlmv1
> overall disabled (except for mschapv2) is setting in freeradius in
> /mods-available/mschap:
>
> mschap {
>
> .....
>
> ntlm_auth = "/path/to/ntlm_auth *--allow-mschapv2* --request-nt-key
> --username=%{mschap:User-Name} --domain=WINDOWSDOMAIN
> --challenge=%{%{mschap:Challenge}:-00}
> --nt-response=%{%{mschap:NT-Response}:-00}"
>
> OR (if your Freeradius supports it)
>
> winbind_username = "%{%{mschap:User-Name}:-00}"
> winbind_domain = "WINDOWSDOMAIN"
>
> The former works just fine, the latter requires freeradius to be
> built with winbind auth, for example for centos i had to rebuild rpm
> and add to ./configure path to winbind libraries.
>
> That's all that's needed to change from the "standard", well
> documented freeradius/AD integration for the integration.
>
> If there are going to be password changes with freeradius ("your
> password has expired" - type - scenarios) You should probably also
> configure in /mods-available/mschap additionaly:
>
> passchange {
> ntlm_auth = "/path/to/ntlm_auth
> --helper-protocol=ntlm-change-password-1 *--allow-mschapv2*"
> ntlm_auth_username = "username: %{mschap:User-Name}"
> ntlm_auth_domain = "nt-domain: WINDOWSDOMAIN"
>
> I'm saying "should probably configure" because with the settings as
> above it works just fine, so even it's unnecessary, it doesn't break
> anything, and unfortunately I was unable to test if it works (I doubt
> it) without this option while denying ntlmv1 overall on ad dc.
>
> If everything works as intented, in the AD DC audit log You will see
> something like this:
> {"timestamp": "some-date0", "type": "Authentication",
> "Authentication": {"version": {"major": 1, "minor": 0}, "status":
> "NT_STATUS_OK", "localAddress": "ipv4:xxx.xxx.xxx.xxx",
> "remoteAddress": "ipv4:xxx.xxx.xxx.xxx:58046", "serviceDescription":
> "SamLogon", "authDescription": "network", "clientDomain":
> "WINDOWSDOMAIN", "clientAccount": "some-user", "workstation":
> "\\\\SOME-HOST", "becameAccount": "some-user", "becameDomain":
> "WINDOWSDOMAIN", "becameSid": "SOME-SID", "mappedAccount":
> "some-user", "mappedDomain": "WINDOWSDOMAIN", "netlogonComputer":
> "SOME-HOST", "netlogonTrustAccount": "SOME-HOST$",
> "netlogonNegotiateFlags": "0x610FFFFF", "netlogonSecureChannelType":
> 2, "netlogonTrustAccountSid": "somesid, *"passwordType": "MSCHAPv2"*}}
>
> Without "--allow-mschapv2" You would see "passwordType":"NTLMv1".
>
> Also I have no idea when ntlm_auth --allow-mschapv2 option was added?
>
Thanks, that gives me something to work with, I will add something to
the Samba wiki ASAP (probably tomorrow)
Rowland
More information about the samba
mailing list