<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<meta content="text/html; charset=ISO-8859-1"
http-equiv="Content-Type">
</head>
<body bgcolor="#ffffff" text="#000000">
On 08/01/2011 10:29 AM, <a class="moz-txt-link-abbreviated" href="mailto:roland.kaeser@intersoft-networks.ch">roland.kaeser@intersoft-networks.ch</a> wrote:
<blockquote
cite="mid:OF3C58FADF.320FF19F-ONC12578DF.004BB745-C12578DF.004F92BB@intersoft-networks.ch"
type="cite"><font size="2" face="sans-serif">Hello</font>
<br>
<br>
<font color="#800080" size="3" face="Times New Roman">></font><font
size="3">
</font><font size="2" face="sans-serif">You might be confused with
this feature.
This password is used with ipa-client auto enroll so that one
can join
a client into the IPA domain. The OTP is used for the
authentication in
this scenario.</font>
<br>
<font color="#800080" size="3" face="Times New Roman">></font><font
size="3">
</font><font size="2" face="sans-serif">In your case you are not
using the
client so OTP is irrelevant. </font>
<br>
<font color="#800080" size="3" face="Times New Roman">></font><font
size="3">
</font><font size="2" face="sans-serif">We do not test Win 7 hosts
as clients
but we know that in the past some people had success with such
configuration.</font>
<br>
<font color="#800080" size="3" face="Times New Roman">></font><font
size="3">
</font>
<br>
<font color="#800080" size="3" face="Times New Roman">></font><font
size="3">
</font><font size="2" face="sans-serif">First please search
archives as there
was an earlier attempt with freeipa 2.0 earlier this year. As I
recall
it was successful. And earlier attempt with 1.x was covered
here:</font>
<br>
<font color="#800080" size="3" face="Times New Roman">></font><font
size="3">
</font><font size="2" face="sans-serif"><a class="moz-txt-link-freetext" href="http://freeipa.org/page/Implementing_FreeIPA_in_a_mixed_Environment_%28Windows/Linux%29_-_Step_by_step">http://freeipa.org/page/Implementing_FreeIPA_in_a_mixed_Environment_%28Windows/Linux%29_-_Step_by_step</a><br>
<br>
The steps described in my mail where exactly the steps
documented in the
link above where its written under "Configuring Windows Client":<br>
------------------<br>
</font><tt><font size="3">3. On the IPA Server add the host
principal and
set the password for the xp client.<br>
..</font></tt>
<br>
<tt><font size="3">ksetup /setmachpassword <password> (the
same
password you have set in IPA server)<br>
</font></tt><font size="2" face="sans-serif">------------------</font><tt><font
size="3"><br>
<br>
</font></tt><font size="2" face="sans-serif">So this confuses me
a lot more.
Specially because the description in the discussed document just
doesn't
work. And, sorry to say that, it also says exactly the converse
of what
You wrote in Your mail. <br>
Also specially. When I use ipa-getkeytab as described in the
document:<br>
<br>
</font><tt><font size="3"> ipa-getkeytab -s ds.example.com -p
host/bmdata01.example.com
-e des-cbc-crc -k krb5.keytab.txt -P<br>
</font></tt><font size="2" face="sans-serif"><br>
I only get "SASL Bind failed!". So I only can create the
host principal in the web interface. Then there is a kind of
missing link
between the exported keytab and what to do with it on the
windows client.
<br>
<br>
I wrote my mail only because I couldn't find any solution while
googleing
for it and also read the freeipa archives. The only thread I
found in the
archives regarding to Windows 7 and Freeipa was:<br>
<br>
</font><a moz-do-not-send="true"
href="https://www.redhat.com/archives/freeipa-users/2011-February/msg00039.html"><font
color="blue" size="3"><u>https://www.redhat.com/archives/freeipa-users/2011-February/msg00039.html</u></font></a><font
size="3">
</font><font size="2" face="sans-serif"><br>
<br>
About the same question and ended in question from Simo about
the installed
krb5-package. I know its annoying with this windows questions
but
the most of us have to deal with mixed environments. Also Redhat
has to
deal with such environments for RHEV manager requires server
2008r2 and
active directory (We currently make also a pilot for a larger
VDI project).
So it cannot be that this scenario (freeipa server and windows 7
clients)
was never tested or documented<br>
<br>
As we (at our side) cannot change the customers desktop from
windows to
linux (cause there are already a lot of special applications
which depends
on a windows desktop), but we can choose the serverplatform and
we wan't
to have linux (specially rhel) as serverplatform and most
desirable:
freeipa as authentication and identity platform. But this can
only
work with a full integration of the windows clients into
freeipa.<br>
<br>
Sorry for the hard mail but as I and My colleagues what to have
Linux and
opensource installed whenever possible, we face often the
problem that
the developers cannot see the problems and needs of us engineers
and administrators
in the front where where we deal with the heterogenous
environments of
our customers. <br>
<br>
So I hope somebody can post a final and working documentation
about the
windows 7 integration into freeipa. We realy depend on this.<br>
<br>
Regards<br>
<br>
Roland<br>
</font></blockquote>
<br>
Let me be fair and frank. We are not testing Windows clients with
IPA. It has been done successfully by different people in the
community several times and comments from them can be found in
archive. Making Windows clients work with IPA is a big challenge
which we have not taken on and do not plant to. The point is that in
our opinion IPA would not be able to replace AD for Windows clients.
There are too many protocols and specific properties that a Windows
client expects from its DC. So the solution can only be very limited
and in most cases not acceptable. So we think that the best approach
to address the issue of Windows clients is to have them in AD but
let IPA be the DC for the Linux servers. For the current version one
can use synchronization of the user accounts from AD to IPA. It is
not perfect but this is best available at the moment. We are
actively working on a much better solution - Cross Forest Kerberos
trusts. Hopefully it will be available next year. That feature would
require users connecting from their desktops from AD domain have a
SSO with services in IPA domain. There are other use cases too.<br>
<br>
But back to your point about clients working with IPA. We do not
know about better info than the one we mentioned. There might be
some MIT documentation about how to join a Windows machine to MIT
KDC. If this can be done I am sure the same can be done with IPA. <br>
<br>
<br>
<blockquote
cite="mid:OF3C58FADF.320FF19F-ONC12578DF.004BB745-C12578DF.004F92BB@intersoft-networks.ch"
type="cite"><font size="2" face="sans-serif">
<br>
</font>
<br>
<br>
<br>
<br>
<br>
<font color="#5f5f5f" size="1" face="sans-serif">Von:
</font><font size="1" face="sans-serif">Dmitri Pal
<a class="moz-txt-link-rfc2396E" href="mailto:dpal@redhat.com"><dpal@redhat.com></a></font>
<br>
<font color="#5f5f5f" size="1" face="sans-serif">An:
</font><font size="1" face="sans-serif"><a class="moz-txt-link-abbreviated" href="mailto:freeipa-users@redhat.com">freeipa-users@redhat.com</a></font>
<br>
<font color="#5f5f5f" size="1" face="sans-serif">Datum:
</font><font size="1" face="sans-serif">01.08.2011 14:39</font>
<br>
<font color="#5f5f5f" size="1" face="sans-serif">Betreff:
</font><font size="1" face="sans-serif">Re: [Freeipa-users]
Once Again: Freeipa and Windows 7</font>
<br>
<font color="#5f5f5f" size="1" face="sans-serif">Gesendet von:
</font><font size="1" face="sans-serif"><a class="moz-txt-link-abbreviated" href="mailto:freeipa-users-bounces@redhat.com">freeipa-users-bounces@redhat.com</a></font>
<br>
<hr noshade="noshade">
<br>
<br>
<br>
<font size="3">On 07/31/2011 04:44 AM, </font><a
moz-do-not-send="true"
href="mailto:roland.kaeser@intersoft-networks.ch"><font
color="blue" size="3"><u>roland.kaeser@intersoft-networks.ch</u></font></a><font
size="3">
wrote: </font>
<br>
<font size="2" face="sans-serif">Hello</font><font size="3"> <br>
</font><font size="2" face="sans-serif"><br>
I'm trying again to setup a pilot freeipa infrastructure for
linux/afs
servers and windows clients. So the first (and most hard) task
is to join
a "windows 7" into freeipa/kerberos. <br>
I already read the available documentation and setup my pilot
client with
the following parameters:<br>
<br>
ksetup /setdomain SAMPLE.CH</font><font size="3"> </font><font
size="2" face="sans-serif"><br>
ksetup /SetRealm SAMPLE.CH</font><font size="3"> </font><font
size="2" face="sans-serif"><br>
ksetup /AddKdc SAMPLE.CH freeipa.sample.ch</font><font size="3">
</font><font size="2" face="sans-serif"><br>
ksetup /AddKpasswd SAMPLE.CH freeipa.sample.ch</font><font
size="3"> </font><font size="2" face="sans-serif"><br>
ksetup /SetComputerPassword MYPASSWORDHERE</font><font size="3">
</font><font size="2" face="sans-serif"><br>
ksetup /MapUser * *<br>
<br>
Changed the available encryption types for kerberos in
secpool.msc under
Local Policies/Security Options/Network Security/Network
Security: Configure
encryption types allowed for Kerberos to:<br>
DES_CBC_CRC,DES_CBC_MD5,RC4_HMAC_MD5,AES128_HMAC_SHA1,AES256_HMAC_SHA1,
Furter
encryption types</font><font size="3"> </font><font size="2"
face="sans-serif"><br>
<br>
Created a host principal in the freeipa webinterface and set the
OTP to
MYPASSWORDHERE.</font>
<br>
<font size="3"><br>
You might be confused with this feature. This password is used
with ipa-client
auto enroll so that one can join a client into the IPA domain.
The OTP
is used for the authentication in this scenario.<br>
In your case you are not using the client so OTP is irrelevant.
<br>
We do not test Win 7 hosts as clients but we know that in the
past some
people had success with such configuration.<br>
<br>
First please search archives as there was an earlier attempt
with freeipa
2.0 earlier this year. As I recall it was successful. And
earlier attempt
with 1.x was covered here:</font><font color="blue" size="3"><u><br>
</u></font><a moz-do-not-send="true"
href="http://freeipa.org/page/Implementing_FreeIPA_in_a_mixed_Environment_%28Windows/Linux%29_-_Step_by_step"><font
color="blue" size="3"><u>http://freeipa.org/page/Implementing_FreeIPA_in_a_mixed_Environment_%28Windows/Linux%29_-_Step_by_step</u></font></a><font
size="3"><br>
</font>
<br>
<font size="2" face="sans-serif"><br>
The clock of the windows 7 machine is synced with the ntpd of
the freeipa
server.<br>
<br>
When I try to login I get the usual password change request
dialog on the
windows 7 client and the following krb5log entry:<br>
<br>
Jul 31 10:39:05 freeipa.sample.ch krb5kdc[6780](info): AS_REQ
(7 etypes {18 17 23 3 1 24 -135}) 192.168.1.90: CLIENT KEY
EXPIRED: </font><a moz-do-not-send="true"
href="mailto:isn-roland@SAMPLE.CH"><font color="blue" size="2"
face="sans-serif"><u>isn-roland@SAMPLE.CH</u></font></a><font
size="2" face="sans-serif">
for </font><a moz-do-not-send="true"
href="mailto:krbtgt/SAMPLE.CH@SAMPLE.CH"><font color="blue"
size="2" face="sans-serif"><u>krbtgt/SAMPLE.CH@SAMPLE.CH</u></font></a><font
size="2" face="sans-serif">,
Password has expired<br>
<br>
When try to change the password I get only "The username or
password
is wrong" with the following krb5log entries:<br>
<br>
Jul 31 10:39:43 freeipa.sample.ch krb5kdc[6780](info): AS_REQ
(7
etypes {18 17 23 3 1 24 -135}) 192.168.1.90: NEEDED_PREAUTH: </font><a
moz-do-not-send="true" href="mailto:isn-roland@SAMPLE.CH"><font
color="blue" size="2" face="sans-serif"><u>isn-roland@SAMPLE.CH</u></font></a><font
size="2" face="sans-serif">
for </font><a moz-do-not-send="true"
href="mailto:kadmin/changepw@SAMPLE.CH"><font color="blue"
size="2" face="sans-serif"><u>kadmin/changepw@SAMPLE.CH</u></font></a><font
size="2" face="sans-serif">,
Additional pre-authentication required</font><font size="3"> </font><font
size="2" face="sans-serif"><br>
Jul 31 10:39:43 freeipa.sample.ch krb5kdc[6780](info): preauth
(timestamp) verify failure: Decrypt integrity check failed</font><font
size="3">
</font><font size="2" face="sans-serif"><br>
Jul 31 10:39:43 freeipa.sample.ch krb5kdc[6780](info): AS_REQ
(7
etypes {18 17 23 3 1 24 -135}) 192.168.1.90: PREAUTH_FAILED: </font><a
moz-do-not-send="true" href="mailto:isn-roland@SAMPLE.CH"><font
color="blue" size="2" face="sans-serif"><u>isn-roland@SAMPLE.CH</u></font></a><font
size="2" face="sans-serif">
for </font><a moz-do-not-send="true"
href="mailto:kadmin/changepw@SAMPLE.CH"><font color="blue"
size="2" face="sans-serif"><u>kadmin/changepw@SAMPLE.CH</u></font></a><font
size="2" face="sans-serif">,
Decrypt integrity check failed</font><font size="3"> </font><font
size="2" face="sans-serif"><br>
Jul 31 10:39:43 freeipa.sample.ch krb5kdc[6780](info): preauth
(timestamp) verify failure: Decrypt integrity check failed</font><font
size="3">
</font><font size="2" face="sans-serif"><br>
Jul 31 10:39:43 freeipa.sample.ch krb5kdc[6780](info): AS_REQ
(7
etypes {18 17 23 3 1 24 -135}) 192.168.1.90: PREAUTH_FAILED: </font><a
moz-do-not-send="true" href="mailto:isn-roland@SAMPLE.CH"><font
color="blue" size="2" face="sans-serif"><u>isn-roland@SAMPLE.CH</u></font></a><font
size="2" face="sans-serif">
for </font><a moz-do-not-send="true"
href="mailto:kadmin/changepw@SAMPLE.CH"><font color="blue"
size="2" face="sans-serif"><u>kadmin/changepw@SAMPLE.CH</u></font></a><font
size="2" face="sans-serif">,
Decrypt integrity check failed<br>
<br>
After long googeling and long investigation, I can't see the
issue behind
this problems. <br>
<br>
Does someone has setup a similar environment and give me some
advice to
get this up and running?<br>
<br>
Regards<br>
<br>
Roland</font><font size="3"> </font>
<br>
<tt><font size="3"><br>
<br>
_______________________________________________<br>
Freeipa-users mailing list<br>
</font></tt><a moz-do-not-send="true"
href="mailto:Freeipa-users@redhat.com"><tt><font color="blue"
size="3"><u>Freeipa-users@redhat.com</u></font></tt></a><tt><font
size="3"><br>
</font></tt><a moz-do-not-send="true"
href="https://www.redhat.com/mailman/listinfo/freeipa-users"><tt><font
color="blue" size="3"><u>https://www.redhat.com/mailman/listinfo/freeipa-users</u></font></tt></a>
<br>
<font size="3"><br>
</font>
<br>
<tt><font size="3">-- <br>
Thank you,<br>
Dmitri Pal<br>
<br>
Sr. Engineering Manager IPA project,<br>
Red Hat Inc.<br>
<br>
<br>
-------------------------------<br>
Looking to carve out IT costs?<br>
</font></tt><a moz-do-not-send="true"
href="http://www.redhat.com/carveoutcosts/"><tt><font
color="blue" size="3"><u>www.redhat.com/carveoutcosts/</u></font></tt></a><tt><font
size="3"><br>
<br>
<br>
</font></tt><tt><font size="2">_______________________________________________<br>
Freeipa-users mailing list<br>
<a class="moz-txt-link-abbreviated" href="mailto:Freeipa-users@redhat.com">Freeipa-users@redhat.com</a><br>
</font></tt><a moz-do-not-send="true"
href="https://www.redhat.com/mailman/listinfo/freeipa-users"><tt><font
size="2">https://www.redhat.com/mailman/listinfo/freeipa-users</font></tt></a>
<br>
<pre wrap="">
<fieldset class="mimeAttachmentHeader"></fieldset>
_______________________________________________
Freeipa-users mailing list
<a class="moz-txt-link-abbreviated" href="mailto:Freeipa-users@redhat.com">Freeipa-users@redhat.com</a>
<a class="moz-txt-link-freetext" href="https://www.redhat.com/mailman/listinfo/freeipa-users">https://www.redhat.com/mailman/listinfo/freeipa-users</a></pre>
</blockquote>
<br>
<br>
<pre class="moz-signature" cols="72">--
Thank you,
Dmitri Pal
Sr. Engineering Manager IPA project,
Red Hat Inc.
-------------------------------
Looking to carve out IT costs?
<a class="moz-txt-link-abbreviated" href="http://www.redhat.com/carveoutcosts/">www.redhat.com/carveoutcosts/</a>
</pre>
</body>
</html>