ntlm_auth returns invalid NT_KEY
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
| samba |
Fix Released
|
Critical
|
||
| samba (Ubuntu) |
Low
|
Unassigned | ||
| Lucid |
Low
|
Unassigned | ||
| Maverick |
Low
|
Unassigned |
Bug Description
Binary package hint: winbind
ntlm_auth returns an invalid response key. This makes programs like freeradius fail. So, it is impossible to authenticate against Active Directory. This affects 802.1X WLAN setups for example, that authenticate against freeradius/Active Directory.
Other programs like Squid may authenticate against Radius too.
This bug seems to be fixed in the not yet released Samba-3.4.9 package.
See https:/
Related branches
- Ubuntu Development Team: Pending requested 2011-02-28
-
Diff: 18873 lines (+18017/-338)41 files modified.pc/applied-patches (+2/-0)
.pc/security-CVE-2011-0719.patch/lib/tevent/tevent_select.c (+247/-0)
.pc/security-CVE-2011-0719.patch/lib/tevent/tevent_standard.c (+569/-0)
.pc/security-CVE-2011-0719.patch/nsswitch/libwbclient/wbc_async.c (+774/-0)
.pc/security-CVE-2011-0719.patch/nsswitch/wb_common.c (+690/-0)
.pc/security-CVE-2011-0719.patch/source3/client/client.c (+5041/-0)
.pc/security-CVE-2011-0719.patch/source3/client/dnsbrowse.c (+237/-0)
.pc/security-CVE-2011-0719.patch/source3/lib/events.c (+330/-0)
.pc/security-CVE-2011-0719.patch/source3/lib/g_lock.c (+766/-0)
.pc/security-CVE-2011-0719.patch/source3/lib/packet.c (+273/-0)
.pc/security-CVE-2011-0719.patch/source3/lib/readline.c (+201/-0)
.pc/security-CVE-2011-0719.patch/source3/lib/select.c (+206/-0)
.pc/security-CVE-2011-0719.patch/source3/lib/util_sock.c (+2012/-0)
.pc/security-CVE-2011-0719.patch/source3/libaddns/dnssock.c (+377/-0)
.pc/security-CVE-2011-0719.patch/source3/libsmb/nmblib.c (+1404/-0)
.pc/security-CVE-2011-0719.patch/source3/nmbd/nmbd_packets.c (+2119/-0)
.pc/security-CVE-2011-0719.patch/source3/utils/smbfilter.c (+295/-0)
.pc/security-CVE-2011-0719.patch/source3/winbindd/winbindd_dual.c (+1550/-0)
debian/changelog (+266/-316)
debian/control (+1/-1)
debian/patches/ntlm-auth-lp623342.patch (+64/-0)
debian/patches/security-CVE-2011-0719.patch (+436/-0)
debian/patches/series (+2/-0)
lib/tevent/tevent_select.c (+10/-0)
lib/tevent/tevent_standard.c (+5/-0)
nsswitch/libwbclient/wbc_async.c (+1/-1)
nsswitch/wb_common.c (+14/-0)
source3/client/client.c (+3/-1)
source3/client/dnsbrowse.c (+11/-0)
source3/lib/events.c (+8/-0)
source3/lib/g_lock.c (+3/-1)
source3/lib/packet.c (+5/-0)
source3/lib/readline.c (+5/-0)
source3/lib/select.c (+12/-0)
source3/lib/util_sock.c (+12/-3)
source3/libaddns/dnssock.c (+5/-0)
source3/libsmb/nmblib.c (+5/-0)
source3/nmbd/nmbd_packets.c (+31/-6)
source3/utils/smbfilter.c (+5/-2)
source3/winbindd/winbindd_cm.c (+13/-7)
source3/winbindd/winbindd_dual.c (+7/-0)
- Ubuntu Development Team: Pending requested 2011-02-28
-
Diff: 19843 lines (+18478/-101)96 files modified.pc/applied-patches (+2/-0)
.pc/security-CVE-2011-0719.patch/lib/tevent/tevent_select.c (+247/-0)
.pc/security-CVE-2011-0719.patch/lib/tevent/tevent_standard.c (+569/-0)
.pc/security-CVE-2011-0719.patch/nsswitch/wb_common.c (+690/-0)
.pc/security-CVE-2011-0719.patch/source3/client/client.c (+5022/-0)
.pc/security-CVE-2011-0719.patch/source3/client/dnsbrowse.c (+237/-0)
.pc/security-CVE-2011-0719.patch/source3/lib/events.c (+304/-0)
.pc/security-CVE-2011-0719.patch/source3/lib/packet.c (+267/-0)
.pc/security-CVE-2011-0719.patch/source3/lib/readline.c (+201/-0)
.pc/security-CVE-2011-0719.patch/source3/lib/select.c (+206/-0)
.pc/security-CVE-2011-0719.patch/source3/lib/util_sock.c (+1989/-0)
.pc/security-CVE-2011-0719.patch/source3/lib/wbclient.c (+715/-0)
.pc/security-CVE-2011-0719.patch/source3/libaddns/dnssock.c (+377/-0)
.pc/security-CVE-2011-0719.patch/source3/libads/cldap.c (+308/-0)
.pc/security-CVE-2011-0719.patch/source3/libsmb/nmblib.c (+1399/-0)
.pc/security-CVE-2011-0719.patch/source3/nmbd/nmbd_packets.c (+1967/-0)
.pc/security-CVE-2011-0719.patch/source3/utils/smbfilter.c (+295/-0)
.pc/security-CVE-2011-0719.patch/source3/winbindd/winbindd.c (+1440/-0)
.pc/security-CVE-2011-0719.patch/source3/winbindd/winbindd_dual.c (+1477/-0)
debian/changelog (+18/-0)
debian/control (+1/-1)
debian/patches/ntlm-auth-lp623342.patch (+63/-0)
debian/patches/security-CVE-2011-0719.patch (+438/-0)
debian/patches/series (+2/-1)
debian/po/ar.po (+1/-1)
debian/po/ast.po (+1/-1)
debian/po/be.po (+1/-1)
debian/po/bg.po (+1/-1)
debian/po/bn.po (+1/-1)
debian/po/bs.po (+1/-1)
debian/po/ca.po (+3/-3)
debian/po/cs.po (+1/-1)
debian/po/da.po (+1/-1)
debian/po/de.po (+1/-1)
debian/po/dz.po (+1/-1)
debian/po/el.po (+1/-1)
debian/po/eo.po (+1/-1)
debian/po/es.po (+2/-3)
debian/po/et.po (+1/-1)
debian/po/eu.po (+1/-1)
debian/po/fi.po (+1/-1)
debian/po/fr.po (+1/-1)
debian/po/gl.po (+1/-1)
debian/po/gu.po (+1/-1)
debian/po/he.po (+1/-1)
debian/po/hu.po (+1/-1)
debian/po/id.po (+1/-1)
debian/po/it.po (+1/-1)
debian/po/ja.po (+1/-1)
debian/po/ka.po (+1/-1)
debian/po/km.po (+1/-1)
debian/po/ko.po (+1/-1)
debian/po/ku.po (+1/-1)
debian/po/lt.po (+3/-3)
debian/po/ml.po (+1/-1)
debian/po/mr.po (+4/-4)
debian/po/nb.po (+6/-6)
debian/po/ne.po (+1/-1)
debian/po/nl.po (+1/-1)
debian/po/nn.po (+5/-5)
debian/po/pl.po (+1/-1)
debian/po/pt.po (+1/-1)
debian/po/pt_BR.po (+1/-1)
debian/po/ro.po (+1/-1)
debian/po/ru.po (+3/-3)
debian/po/sk.po (+1/-1)
debian/po/sl.po (+1/-1)
debian/po/sq.po (+1/-1)
debian/po/sv.po (+1/-1)
debian/po/ta.po (+1/-1)
debian/po/th.po (+1/-1)
debian/po/tl.po (+1/-1)
debian/po/tr.po (+1/-1)
debian/po/vi.po (+11/-12)
debian/po/wo.po (+1/-1)
debian/po/zh_CN.po (+1/-1)
debian/po/zh_TW.po (+1/-1)
lib/tevent/tevent_select.c (+10/-0)
lib/tevent/tevent_standard.c (+5/-0)
nsswitch/wb_common.c (+17/-0)
source3/client/client.c (+3/-1)
source3/client/dnsbrowse.c (+11/-0)
source3/lib/events.c (+8/-0)
source3/lib/packet.c (+5/-0)
source3/lib/readline.c (+5/-0)
source3/lib/select.c (+12/-0)
source3/lib/util_sock.c (+9/-2)
source3/lib/wbclient.c (+8/-1)
source3/libaddns/dnssock.c (+5/-0)
source3/libads/cldap.c (+5/-0)
source3/libsmb/nmblib.c (+5/-0)
source3/nmbd/nmbd_packets.c (+22/-2)
source3/utils/smbfilter.c (+6/-2)
source3/winbindd/winbindd.c (+6/-0)
source3/winbindd/winbindd_cm.c (+13/-7)
source3/winbindd/winbindd_dual.c (+7/-0)
Changed in samba (Ubuntu): | |
importance: | Undecided → Low |
Changed in samba: | |
status: | Unknown → Confirmed |
Lawrence Troup (lawrencetroup) wrote : | #1 |
Lawrence Troup (lawrencetroup) wrote : | #2 |
Can someone comment on whether this fix is going to be released on Lucid? This is causing us serious problems, meaning our company's wireless network is essentially unusable.
Changed in samba (Ubuntu): | |
status: | New → Confirmed |
Kai Blin (kai.blin) wrote : | #3 |
As of 2010-11-16, this bug is not yet confirmed to be fixed. If you want to help, please test the bugfix on the corresponding Samba bug and report your results on the Samba bugzilla.
Lawrence Troup (lawrencetroup) wrote : | #4 |
I have tested the fix attached to the Samba bug on my Ubuntu Lucid server, and this fixed the problem - ntlm_auth now works correctly.
I've posted a comment on Samba bugzilla, confirming that the patch fixes this issue. Is this sufficient for getting the fix released for Lucid?
Adam Bishop (adam-omega) wrote : | #5 |
This is fixed in the 3.5.9 packages from Natty.
It's a complete show stopper for any sort of RADIUS installation authenticating against AD, so the severity should be a bit higher I think.
The patch is available so could this get packaged?
Changed in samba: | |
importance: | Unknown → Critical |
Stefano Rivera (stefanor) wrote : | #6 |
Apparently fixed in the version in natty, I intend to upload SRUs for Lucid and Maverick.
Changed in samba (Ubuntu): | |
status: | Confirmed → Fix Released |
Stefano Rivera (stefanor) wrote : | #7 |
SRU Test Case [ Provided by Craig Balfour]:
Install Software
----------------
apt-get install samba winbind krb5-user freeradius
Configure Kerberos
------------------
Edit /etc/krb5.conf:
[realms]
EXAMPLE.CO.ZA = {
kdc = server1.
kdc = server2.
}
[domain_realm]
Configure Samba
---------------
Edit /etc/samba/
workgroup = EXAMPLE
security = ads
realm = EXAMPLE.CO.ZA
Join Samba to Active Directory Domain
-------
net join -U Administrator
service winbind restart
service smbd restart
Configure freeradius
-------
Edit /etc/freeradius
ntlm_auth = "/usr/bin/ntlm_auth --request-nt-key --username=
addgroup freerad winbindd_priv
service freeradius restart
Install and Configure rad_eap_test
-------
apt-get install libssl-dev
Download http://
tar zxvof wpa_supplicant-
cd wpa_supplicant-
Create .config:
CONFIG_
CONFIG_
CONFIG_EAP_TLS=y
CONFIG_EAP_PEAP=y
CONFIG_EAP_TTLS=y
CONFIG_EAP_LEAP=y
CONFIG_IEEE8021X=y
make eapol_test
Download http://
tar jxvof rad_eap_
cd rad_eap_test-0.23
cp ../wpa_
./rad_eap_test -H localhost -P 1812 -S testing123 -u fred -p password -m WPA-EAP -e PEAP
With faulty version of Samba test returns:
access-reject; 1
With fixed version of Samba, test returns:
access-accept; 0
References:
1. http://
2. http://
Changed in samba (Ubuntu Lucid): | |
importance: | Undecided → Low |
Changed in samba (Ubuntu Maverick): | |
importance: | Undecided → Low |
Changed in samba (Ubuntu Lucid): | |
status: | New → In Progress |
Changed in samba (Ubuntu Maverick): | |
status: | New → In Progress |
Stefano Rivera (stefanor) wrote : | #8 |
I have builds of the proposed branches in my SRU PPA: https:/
Stefano Rivera (stefanor) wrote : | #9 |
Stefano Rivera (stefanor) wrote : | #10 |
Benjamin Drung (bdrung) wrote : | #11 |
Uploaded samba 2:3.5.4~
Changed in samba (Ubuntu Maverick): | |
status: | In Progress → Fix Committed |
Benjamin Drung (bdrung) wrote : | #12 |
Uploaded samba 2:3.4.7~
Changed in samba (Ubuntu Lucid): | |
status: | In Progress → Fix Committed |
Accepted samba into lucid-proposed, the package will build now and be available in a few hours. Please test and give feedback here. See https:/
tags: | added: verification-needed |
Martin Pitt (pitti) wrote : | #14 |
Accepted samba into maverick-proposed, the package will build now and be available in a few hours. Please test and give feedback here. See https:/
Lawrence Troup (lawrencetroup) wrote : | #15 |
I've updated to the proposed package for Lucid, and tested it, and can confirm that this fixes the ntlm_auth issue.
tags: | added: verification-done-lucid |
Launchpad Janitor (janitor) wrote : | #16 |
This bug was fixed in the package samba - 2:3.4.7~
---------------
samba (2:3.4.
* debian/
response key. (LP: #623342) Patch taken from upstream
(https:/
-- Stefano Rivera <email address hidden> Wed, 02 Mar 2011 22:40:42 +0100
Changed in samba (Ubuntu Lucid): | |
status: | Fix Committed → Fix Released |
Aiko Barz (aiko-chroot) wrote : | #17 |
The patch does not work for me... :(
I installed "samba (2:3.4.
$ ./rad_eap_test -H localhost -P 1812 -S testing123 -u "DOMAIN\user" -p password -m WPA-EAP -e PEAP
timeout; 5
I patched "samba (2:3.4.
$ ./rad_eap_test -H localhost -P 1812 -S testing123 -u "DOMAIN\user" -p password -m WPA-EAP -e PEAP
access-accept; 0
So long,
Aiko
Stefano Rivera (stefanor) wrote : | #18 |
Sorry for the delay on testing. We are having no issue with the lucid update, and have tested the maverick one too.
Aiko:
I've prepared a PPA Build with a later version of the patch you linked to:
https:/
It seems to work (no regressions), but we also aren't seeing the issue you are (a timeout).
I suggest filing a separate bug for this.
tags: |
added: verification-done removed: verification-done-lucid verification-needed |
Launchpad Janitor (janitor) wrote : | #19 |
This bug was fixed in the package samba - 2:3.5.4~
---------------
samba (2:3.5.
* debian/
response key. (LP: #623342) Patch taken from upstream
(https:/
-- Stefano Rivera <email address hidden> Wed, 02 Mar 2011 22:38:19 +0100
Changed in samba (Ubuntu Maverick): | |
status: | Fix Committed → Fix Released |
Aiko Barz (aiko-chroot) wrote : | #20 |
I had a closer look at those bug reports. And I found other people[1] who mention that the patch from [2] is not enough. They use [3], which is a configurable variant of [4].
On the other hand, Stefan Metzmacher says in [5], that we should try Samba-3.5.8. Stefan Metzmacher is also the code reviewer from [2].
And I can confirm, that Ubuntu 11.04 with Samba-3.
$ ./rad_eap_test -H localhost -P 1812 -S Password123 -u 'DOMAIN\user' -p Password -m WPA-EAP -e PEAP
access-accept; 0
[1]: https:/
[2]: https:/
[3]: https:/
[4]: https:/
[5]: https:/
Clint Byrum (clint-fewbar) wrote : | #21 |
Aiko, as Stefano suggested earlier, this sounds like something that should be tracked as a new (but related) issue, as this bug report appears to be fixed for some of the affected users.
Alex Mauer (hawke) wrote : | #22 |
This bug is not fixed for me in 2:3.4.7~
Changed in samba: | |
status: | Confirmed → Incomplete |
Aiko Barz (aiko-chroot) wrote : | #23 |
Sorry for the late answer.
I missed the updates before but I have seen the change "Confirmed → Incomplete".
My initial problem has gone with 12.04. I no longer need any patches. Everythings works out of the box.
Thanks,
Aiko
Changed in samba: | |
status: | Incomplete → Fix Released |
Is there are reason why the priority of this bug is so low? This issue prevents deployment of freeradius authenticating against Active Directory in a corporate environment.
My company has recently upgraded to using the LucidLynx server release of Ubuntu on our main servers - and this issue means that it is no longer possible to perform the necessary authentication for users on our network. In particular, this means we are no longer able to provide wireless network access to our employees - which is a serious problem.
Given that LucidLynx is a LTS release, is there a plan to release the version of Samba containing the fix for this bug to Lucid soon?