Linux winbind troubleshooting

 

Kerberos

Active directory uses Kerberos to verify user or host identity.

The kinit command can be used to test the Kerberos authentication mechanism

The kinit command obtains and caches Kerberos ticket-granting tickets

Use the kinit commands as follows

kinit active-directory-user

active-directory-user should be changed to any Active Directory user account.

If the user exists you should get a password response similiar to the following.

Password for active-directory-user@DOMAIN.LOCAL:

Type the password in and you should get the following response

Authenticated to Kerberos v5

klist

Ticket cache: FILE:/tmp/krb5cc_0
Default principal: active-directory-user@DOMAIN.LOCAL

Valid starting     Expires            Service principal
06/01/11 14:49:30  06/02/11 00:49:35  krbtgt/DOMAIN.LOCAL@DOMAIN.LOCAL
        renew until 06/02/11 14:49:30

Kerberos 4 ticket cache: /tmp/tkt0
klist: You have no tickets cached

wbinfo -p

Ping to winbindd succeeded on fd 4

wbinfo --all-domains

DOMAIN

wbinfo -u

Error looking up domain users

wbinfo -t

checking the trust secret via RPC calls failed
error code was NT_STATUS_DOMAIN_CONTROLLER_NOT_FOUND (0xc0000233)
Could not check secret