[OpenIndiana-discuss] OI idmap/smbsrv vs. older versions

Jim Klimov jimklimov at cos.ru
Mon Dec 30 06:40:48 UTC 2013


Hello all,

   A problem has been noted on a server upgraded (with migration
of configs) from older SXCE snv_117 into OpenIndiana oi_151a8
regarding kCIFS support: While the old installations performed
quite well as a CIFS server in the domain, serving also for some
clients that are not part of the domain (however, with Windows
logins and passwords on the standalone PCs being identical to
those in the domain), the new installation (with old configs
including old idmap setup database files) often refuses access
at least for these stand-alone machines because it does not
recognize login attempts as authenticated:

Dec 30 10:19:27 thumper smbsrv: [ID 138215 kern.notice] NOTICE:
smbd[THUMPER\nobody]: distribs access denied: guest disabled

This happens even if I redefine the password for users locally
in OI with passwd (the pam.conf patch for smb is applied).
The accounts who need access to the fileserver part are defined
locally (/etc/passwd et al) without AD LDAP clientship and stuff.

Possibly, this happens because the Windows client presents the
username prepended with its own local host name (PC\username)
in absence of the domain membership. Possibly, then it tries
"Guest" which is disabled.

However, if the user waits until after the timeout and types
his login as "THUMPER\username", the access is granted.

So, the current configs are as follows:

# grep -v '#' /etc/pam.conf
login   auth requisite          pam_authtok_get.so.1
login   auth required           pam_dhkeys.so.1
login   auth required           pam_unix_cred.so.1
login   auth required           pam_unix_auth.so.1
login   auth required           pam_dial_auth.so.1
rlogin  auth sufficient         pam_rhosts_auth.so.1
rlogin  auth requisite          pam_authtok_get.so.1
rlogin  auth required           pam_dhkeys.so.1
rlogin  auth required           pam_unix_cred.so.1
rlogin  auth required           pam_unix_auth.so.1
krlogin auth required           pam_unix_cred.so.1
krlogin auth required           pam_krb5.so.1
rsh     auth sufficient         pam_rhosts_auth.so.1
rsh     auth required           pam_unix_cred.so.1
krsh    auth required           pam_unix_cred.so.1
krsh    auth required           pam_krb5.so.1
ktelnet auth required           pam_unix_cred.so.1
ktelnet auth required           pam_krb5.so.1
ppp     auth requisite          pam_authtok_get.so.1
ppp     auth required           pam_dhkeys.so.1
ppp     auth required           pam_unix_cred.so.1
ppp     auth required           pam_unix_auth.so.1
ppp     auth required           pam_dial_auth.so.1
gdm-autologin auth  required    pam_unix_cred.so.1
gdm-autologin auth  sufficient  pam_allow.so.1
other   auth requisite          pam_authtok_get.so.1
other   auth required           pam_dhkeys.so.1
other   auth required           pam_unix_cred.so.1
other   auth required           pam_unix_auth.so.1
passwd  auth required           pam_passwd_auth.so.1
cron    account required        pam_unix_account.so.1
cups    account required        pam_unix_account.so.1
gdm-autologin account  sufficient  pam_allow.so.1
other   account requisite       pam_roles.so.1
other   account required        pam_unix_account.so.1
other   session required        pam_unix_session.so.1
other   password required       pam_dhkeys.so.1
other   password requisite      pam_authtok_get.so.1
other   password requisite      pam_authtok_check.so.1
other   password required       pam_authtok_store.so.1
other   password required       pam_smb_passwd.so.1     nowarn


# idmap list
add     winname:Guest at thumper   unixuser:nobody
add     winuser:Administrator at thumper   unixuser:root
add     wingroup:*@domain.ru       unixgroup:*
add     "wingroup:Domain Users at domain.ru"  unixgroup:staff
add     "wingroup:Domain Admins at domain.ru" unixgroup:sysadmin
add     wingroup:SYSTEM at domain.ru  unixgroup:winsystem
add     wingroup:Administrators at BUILTIN unixgroup:winadmins-builtin
add     wingroup:Network        unixgroup:winnet
add     "wingroup:Authenticated Users"  unixgroup:winusers-auth
add     "wingroup:Schema Admins at domain.ru" unixgroup:winadmins-schema
add     "wingroup:Enterprise Admins at domain.ru" 
unixgroup:winadmins-enterprise
add     winuser:jim at domain.ru      unixuser:jim
add     "wingroup:Power Users at BUILTIN"  unixgroup:winusers-power
add     winuser:*@domain.ru        unixuser:*



Adding another mapping that would match non-domain users to the
accounts defined in OI fails, possibly because the second pattern
is the same:

# idmap add 'winuser:*' 'unixuser:*'
add     winuser:*       unixuser:*
Error commiting transaction (Duplicate rule or conflicts with an 
existing Unix to Windows name-based rule)

# idmap add 'winuser:*@thumper' 'unixuser:*'
add     winuser:*@thumper       unixuser:*
Error commiting transaction (Duplicate rule or conflicts with an 
existing Unix to Windows name-based rule)


So... are there any ideas what can differ between the old and new
setups in a way that old works and new doesn't? Did the software
logic change somehow, or rather some config tweak was not migrated?

Thanks,
//Jim Klimov




More information about the OpenIndiana-discuss mailing list