Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 560239 - cliconnect gets realm wrong with trusted domains
cliconnect gets realm wrong with trusted domains
Status: CLOSED ERRATA
Product: Red Hat Enterprise Linux 5
Classification: Red Hat
Component: samba3x (Show other bugs)
5.4
All Linux
low Severity medium
: rc
: ---
Assigned To: Guenther Deschner
qe-baseos-daemons
:
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2010-01-30 10:04 EST by Jason Montleon
Modified: 2011-01-13 17:44 EST (History)
3 users (show)

See Also:
Fixed In Version: samba3x-3.3.12-0.53.el5
Doc Type: Bug Fix
Doc Text:
Service principal names were not always created correctly and as a result, the system was attempting to acquire a service ticket using a wrong hostname. This caused the Kerberos authentication to fail. With this update, service principal names are created correctly.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2011-01-13 17:44:37 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2011:0054 normal SHIPPED_LIVE samba3x bug fix and enhancement update 2011-01-12 12:15:21 EST

  None (edit)
Description Jason Montleon 2010-01-30 10:04:36 EST
Description of problem:
if you have a trust between an MIT kerberos realm and an Active Directory
Domain, say EXAMPLE.COM and AD.EXAMPLE.COM it will always guess that the server
principle is server$@EXAMPLE.COM and never try server$@AD.EXAMPLE.COM

so, if do a kinit for user@EXAMPLE.COM then try to do a smbclient -k
//server.ad.example.com/whatever it will end up trying the principal
server$@EXAMPLE.COM instead of server$@AD.EXAMPLE.COM

Version-Release number of selected component (if applicable):
Fedora 12: 
samba-common-3.4.5-55.fc12.x86_64
samba-client-3.4.5-55.fc12.x86_64
samba-3.4.5-55.fc12.x86_64

Red Hat Enterprise Linux 5.4:
samba-common-3.0.33-3.15.el5_4.1
samba-3.0.33-3.15.el5_4.1
samba-client-3.0.33-3.15.el5_4.1

How reproducible:
Always

Steps to Reproduce:
1. Create a trust between the kerberos realm and Active Directory Domain
2. Do a kinit on linux system
3. smbclient -k //server.ad.example.com/whatever  

Actual results:
Connection Fails

Expected results:
Connection succeeds

Additional info:
Upstream bug report and patch: https://bugzilla.samba.org/show_bug.cgi?id=7079
Comment 7 Eva Kopalova 2010-12-15 02:55:11 EST
    Technical note added. If any revisions are required, please edit the "Technical Notes" field
    accordingly. All revisions will be proofread by the Engineering Content Services team.
    
    New Contents:
Service principal names were not always created correctly and as a result, the system was attempting to acquire a service ticket from a wrong host. This caused the Kerberos authentication to fail. With this update, service principal names are created correctly.
Comment 8 Eva Kopalova 2010-12-15 03:08:04 EST
    Technical note updated. If any revisions are required, please edit the "Technical Notes" field
    accordingly. All revisions will be proofread by the Engineering Content Services team.
    
    Diffed Contents:
@@ -1 +1 @@
-Service principal names were not always created correctly and as a result, the system was attempting to acquire a service ticket from a wrong host. This caused the Kerberos authentication to fail. With this update, service principal names are created correctly.+Service principal names were not always created correctly and as a result, the system was attempting to acquire a service ticket using a wrong hostname. This caused the Kerberos authentication to fail. With this update, service principal names are created correctly.
Comment 10 errata-xmlrpc 2011-01-13 17:44:37 EST
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on therefore solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHBA-2011-0054.html

Note You need to log in before you can comment on or make changes to this bug.