On 2025-03-28 08:42, Alexander Bokovoy wrote:
Sure, what's surprising here? From IPA side you can access resources on
the trusted AD forest side if you have inbound trust. You cannot do that
from Windows machines because their UI calls into some DCE RPC APIs we
do not support on IPA side. They also try to call into Global Catalog
and the primary LDAP instances while expecting those to have AD LDAP
schema and DIT structure. IPA is not supporting those so no wonder
things fail.
One strange observation after playing more with SIDs. I was trying to
add the admin-user from IPA's sid to a local group,.
The domain controller of course don't have any local groups or users.
Well, it has some, look at this:
PS C:\Users\Administrator> Get-LocalGroup
Name Description
---- -----------
Cert Publishers Members of this group are
permitted to publish certificates to the directory
RAS and IAS Servers Servers in this group can access
remote access properties of users
Allowed RODC Password Replication Group Members in this group can have
their passwords replicated to all read-only d...
Denied RODC Password Replication Group Members in this group cannot
have their passwords replicated to any read-onl...
PS C:\Users\Administrator> Add-LocalGroupMember -Group "Cert Publishers"
-Member "S-1-5-21-355267255-715991334-1594671509-500"
PS C:\Users\Administrator> Get-LocalGroupMember "Cert Publishers"
ObjectClass Name PrincipalSource
----------- ---- ---------------
User IPA-NAS-LAB\admin ActiveDirectory
PS C:\Users\Administrator>
It seems that via this powershell-command it is actually able to resolve
the SID, from the IPA-domain, but this puzzles me, and I cannot
understand why, the SID is not resolved when i look at the previous
mentioned NTFS-acls in the gui?
For fun I also tryed to forcefully change the ipaNTSecurityIdentifier on
an IPA-user to mach ADs, but then my kerberos tickets get recjected on
the local KDC (which seems reasonable):
root@ipa-nas:~# ldapsearch -LLLQ uid=ipauser ipaNTSecurityIdentifier
dn: uid=ipauser,cn=users,cn=compat,dc=ipa-nas,dc=lab,dc=skyfritt,dc=net
dn: uid=ipauser,cn=users,cn=compat,dc=ipa-nas,dc=lab,dc=skyfritt,dc=net
dn: uid=ipauser,cn=users,cn=accounts,dc=ipa-nas,dc=lab,dc=skyfritt,dc=net
ipaNTSecurityIdentifier: S-1-5-21-3335129051-2596296882-561087841-1108
Can this be overridden some how locally, just for eksperimental purposes?
Mar 28 11:38:50 ipa-nas.ipa-nas.lab.skyfritt.net krb5kdc[1385](info):
closing down fd 11
Mar 28 11:38:50 ipa-nas.ipa-nas.lab.skyfritt.net krb5kdc[1384](Error):
PAC issue: PAC record claims domain SID different to local domain SID or
any trusted domain SID: local [S-1-5-21-355267255-715991334-1594671509],
PAC [S-1-5-21-3335129051-2596296882-561087841]
Mar 28 11:38:50 ipa-nas.ipa-nas.lab.skyfritt.net krb5kdc[1384](info):
TGS_REQ : handle_authdata (-1765328364)
Mar 28 11:38:50 ipa-nas.ipa-nas.lab.skyfritt.net krb5kdc[1384](info):
TGS_REQ (4 etypes {aes256-cts-hmac-sha384-192(20),
aes128-cts-hmac-sha256-128(19),
I just want to see how the ADs KDC, handles this, if its possible at all.
--
Vennlig Hilsen
Jostein Fossheim
--
_______________________________________________
FreeIPA-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct:
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives:
https://lists.fedorahosted.org/archives/list/[email protected]
Do not reply to spam, report it:
https://pagure.io/fedora-infrastructure/new_issue